Dec 13 02:02:23.874127 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Dec 12 23:50:37 -00 2024 Dec 13 02:02:23.874152 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 02:02:23.874163 kernel: BIOS-provided physical RAM map: Dec 13 02:02:23.874171 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Dec 13 02:02:23.874178 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Dec 13 02:02:23.874186 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Dec 13 02:02:23.874196 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000009cfdbfff] usable Dec 13 02:02:23.874204 kernel: BIOS-e820: [mem 0x000000009cfdc000-0x000000009cffffff] reserved Dec 13 02:02:23.874213 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Dec 13 02:02:23.874221 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved Dec 13 02:02:23.874229 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Dec 13 02:02:23.874237 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Dec 13 02:02:23.874245 kernel: BIOS-e820: [mem 0x000000fd00000000-0x000000ffffffffff] reserved Dec 13 02:02:23.874253 kernel: NX (Execute Disable) protection: active Dec 13 02:02:23.874264 kernel: SMBIOS 2.8 present. Dec 13 02:02:23.874273 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 Dec 13 02:02:23.874281 kernel: Hypervisor detected: KVM Dec 13 02:02:23.874289 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 13 02:02:23.874298 kernel: kvm-clock: cpu 0, msr 4019b001, primary cpu clock Dec 13 02:02:23.874306 kernel: kvm-clock: using sched offset of 2410573416 cycles Dec 13 02:02:23.874315 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 13 02:02:23.874323 kernel: tsc: Detected 2794.748 MHz processor Dec 13 02:02:23.874332 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 02:02:23.874343 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 02:02:23.874352 kernel: last_pfn = 0x9cfdc max_arch_pfn = 0x400000000 Dec 13 02:02:23.874368 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 02:02:23.874377 kernel: Using GB pages for direct mapping Dec 13 02:02:23.874385 kernel: ACPI: Early table checksum verification disabled Dec 13 02:02:23.874394 kernel: ACPI: RSDP 0x00000000000F59D0 000014 (v00 BOCHS ) Dec 13 02:02:23.874403 kernel: ACPI: RSDT 0x000000009CFE2408 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 02:02:23.874412 kernel: ACPI: FACP 0x000000009CFE21E8 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 02:02:23.874420 kernel: ACPI: DSDT 0x000000009CFE0040 0021A8 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 02:02:23.874431 kernel: ACPI: FACS 0x000000009CFE0000 000040 Dec 13 02:02:23.874439 kernel: ACPI: APIC 0x000000009CFE22DC 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 02:02:23.874448 kernel: ACPI: HPET 0x000000009CFE236C 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 02:02:23.874457 kernel: ACPI: MCFG 0x000000009CFE23A4 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 02:02:23.874466 kernel: ACPI: WAET 0x000000009CFE23E0 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 02:02:23.874474 kernel: ACPI: Reserving FACP table memory at [mem 0x9cfe21e8-0x9cfe22db] Dec 13 02:02:23.874483 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cfe0040-0x9cfe21e7] Dec 13 02:02:23.874492 kernel: ACPI: Reserving FACS table memory at [mem 0x9cfe0000-0x9cfe003f] Dec 13 02:02:23.874505 kernel: ACPI: Reserving APIC table memory at [mem 0x9cfe22dc-0x9cfe236b] Dec 13 02:02:23.874514 kernel: ACPI: Reserving HPET table memory at [mem 0x9cfe236c-0x9cfe23a3] Dec 13 02:02:23.874524 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cfe23a4-0x9cfe23df] Dec 13 02:02:23.874533 kernel: ACPI: Reserving WAET table memory at [mem 0x9cfe23e0-0x9cfe2407] Dec 13 02:02:23.874542 kernel: No NUMA configuration found Dec 13 02:02:23.874552 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cfdbfff] Dec 13 02:02:23.874563 kernel: NODE_DATA(0) allocated [mem 0x9cfd6000-0x9cfdbfff] Dec 13 02:02:23.874572 kernel: Zone ranges: Dec 13 02:02:23.874581 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 02:02:23.874590 kernel: DMA32 [mem 0x0000000001000000-0x000000009cfdbfff] Dec 13 02:02:23.874599 kernel: Normal empty Dec 13 02:02:23.874609 kernel: Movable zone start for each node Dec 13 02:02:23.874618 kernel: Early memory node ranges Dec 13 02:02:23.874627 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Dec 13 02:02:23.874636 kernel: node 0: [mem 0x0000000000100000-0x000000009cfdbfff] Dec 13 02:02:23.874647 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cfdbfff] Dec 13 02:02:23.874656 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 02:02:23.874665 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Dec 13 02:02:23.874675 kernel: On node 0, zone DMA32: 12324 pages in unavailable ranges Dec 13 02:02:23.874684 kernel: ACPI: PM-Timer IO Port: 0x608 Dec 13 02:02:23.874693 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 13 02:02:23.874702 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Dec 13 02:02:23.874711 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Dec 13 02:02:23.874721 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 13 02:02:23.874730 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 02:02:23.874741 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 13 02:02:23.874750 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 13 02:02:23.874759 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 02:02:23.874768 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Dec 13 02:02:23.874777 kernel: TSC deadline timer available Dec 13 02:02:23.874786 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Dec 13 02:02:23.874796 kernel: kvm-guest: KVM setup pv remote TLB flush Dec 13 02:02:23.874805 kernel: kvm-guest: setup PV sched yield Dec 13 02:02:23.874814 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices Dec 13 02:02:23.874825 kernel: Booting paravirtualized kernel on KVM Dec 13 02:02:23.874835 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 02:02:23.874844 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Dec 13 02:02:23.874853 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 Dec 13 02:02:23.874864 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 Dec 13 02:02:23.874874 kernel: pcpu-alloc: [0] 0 1 2 3 Dec 13 02:02:23.874883 kernel: kvm-guest: setup async PF for cpu 0 Dec 13 02:02:23.874894 kernel: kvm-guest: stealtime: cpu 0, msr 9a41c0c0 Dec 13 02:02:23.874904 kernel: kvm-guest: PV spinlocks enabled Dec 13 02:02:23.874918 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Dec 13 02:02:23.874927 kernel: Built 1 zonelists, mobility grouping on. Total pages: 632732 Dec 13 02:02:23.874936 kernel: Policy zone: DMA32 Dec 13 02:02:23.874947 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 02:02:23.874957 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 02:02:23.874967 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Dec 13 02:02:23.874976 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 02:02:23.874986 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 02:02:23.874997 kernel: Memory: 2436696K/2571752K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47476K init, 4108K bss, 134796K reserved, 0K cma-reserved) Dec 13 02:02:23.875006 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Dec 13 02:02:23.875016 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 02:02:23.875025 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 02:02:23.875034 kernel: rcu: Hierarchical RCU implementation. Dec 13 02:02:23.875044 kernel: rcu: RCU event tracing is enabled. Dec 13 02:02:23.875053 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Dec 13 02:02:23.875075 kernel: Rude variant of Tasks RCU enabled. Dec 13 02:02:23.875084 kernel: Tracing variant of Tasks RCU enabled. Dec 13 02:02:23.875094 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 02:02:23.875103 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Dec 13 02:02:23.875112 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Dec 13 02:02:23.875121 kernel: random: crng init done Dec 13 02:02:23.875130 kernel: Console: colour VGA+ 80x25 Dec 13 02:02:23.875140 kernel: printk: console [ttyS0] enabled Dec 13 02:02:23.875149 kernel: ACPI: Core revision 20210730 Dec 13 02:02:23.875159 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Dec 13 02:02:23.875168 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 02:02:23.875179 kernel: x2apic enabled Dec 13 02:02:23.875189 kernel: Switched APIC routing to physical x2apic. Dec 13 02:02:23.875198 kernel: kvm-guest: setup PV IPIs Dec 13 02:02:23.875208 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Dec 13 02:02:23.875217 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Dec 13 02:02:23.875226 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) Dec 13 02:02:23.875236 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Dec 13 02:02:23.875246 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Dec 13 02:02:23.875256 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Dec 13 02:02:23.875273 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 02:02:23.875283 kernel: Spectre V2 : Mitigation: Retpolines Dec 13 02:02:23.875293 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 02:02:23.875304 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 02:02:23.875313 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Dec 13 02:02:23.875323 kernel: RETBleed: Mitigation: untrained return thunk Dec 13 02:02:23.875333 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 13 02:02:23.875343 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 13 02:02:23.875353 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 02:02:23.875373 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 02:02:23.875383 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 02:02:23.875392 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 02:02:23.875402 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Dec 13 02:02:23.875412 kernel: Freeing SMP alternatives memory: 32K Dec 13 02:02:23.875422 kernel: pid_max: default: 32768 minimum: 301 Dec 13 02:02:23.875431 kernel: LSM: Security Framework initializing Dec 13 02:02:23.875443 kernel: SELinux: Initializing. Dec 13 02:02:23.875453 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 02:02:23.875463 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 02:02:23.875473 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) Dec 13 02:02:23.875482 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Dec 13 02:02:23.875492 kernel: ... version: 0 Dec 13 02:02:23.875502 kernel: ... bit width: 48 Dec 13 02:02:23.875511 kernel: ... generic registers: 6 Dec 13 02:02:23.875521 kernel: ... value mask: 0000ffffffffffff Dec 13 02:02:23.875532 kernel: ... max period: 00007fffffffffff Dec 13 02:02:23.875542 kernel: ... fixed-purpose events: 0 Dec 13 02:02:23.875552 kernel: ... event mask: 000000000000003f Dec 13 02:02:23.875561 kernel: signal: max sigframe size: 1776 Dec 13 02:02:23.875571 kernel: rcu: Hierarchical SRCU implementation. Dec 13 02:02:23.875580 kernel: smp: Bringing up secondary CPUs ... Dec 13 02:02:23.875590 kernel: x86: Booting SMP configuration: Dec 13 02:02:23.875600 kernel: .... node #0, CPUs: #1 Dec 13 02:02:23.875610 kernel: kvm-clock: cpu 1, msr 4019b041, secondary cpu clock Dec 13 02:02:23.875619 kernel: kvm-guest: setup async PF for cpu 1 Dec 13 02:02:23.875631 kernel: kvm-guest: stealtime: cpu 1, msr 9a49c0c0 Dec 13 02:02:23.875641 kernel: #2 Dec 13 02:02:23.875651 kernel: kvm-clock: cpu 2, msr 4019b081, secondary cpu clock Dec 13 02:02:23.875661 kernel: kvm-guest: setup async PF for cpu 2 Dec 13 02:02:23.875670 kernel: kvm-guest: stealtime: cpu 2, msr 9a51c0c0 Dec 13 02:02:23.875680 kernel: #3 Dec 13 02:02:23.875690 kernel: kvm-clock: cpu 3, msr 4019b0c1, secondary cpu clock Dec 13 02:02:23.875699 kernel: kvm-guest: setup async PF for cpu 3 Dec 13 02:02:23.875709 kernel: kvm-guest: stealtime: cpu 3, msr 9a59c0c0 Dec 13 02:02:23.875721 kernel: smp: Brought up 1 node, 4 CPUs Dec 13 02:02:23.875730 kernel: smpboot: Max logical packages: 1 Dec 13 02:02:23.875740 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) Dec 13 02:02:23.875750 kernel: devtmpfs: initialized Dec 13 02:02:23.875759 kernel: x86/mm: Memory block size: 128MB Dec 13 02:02:23.875770 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 02:02:23.875779 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Dec 13 02:02:23.875792 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 02:02:23.875801 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 02:02:23.875813 kernel: audit: initializing netlink subsys (disabled) Dec 13 02:02:23.875823 kernel: audit: type=2000 audit(1734055343.988:1): state=initialized audit_enabled=0 res=1 Dec 13 02:02:23.875833 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 02:02:23.875843 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 02:02:23.875852 kernel: cpuidle: using governor menu Dec 13 02:02:23.875862 kernel: ACPI: bus type PCI registered Dec 13 02:02:23.875871 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 02:02:23.875881 kernel: dca service started, version 1.12.1 Dec 13 02:02:23.875891 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Dec 13 02:02:23.875902 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Dec 13 02:02:23.875912 kernel: PCI: Using configuration type 1 for base access Dec 13 02:02:23.875922 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 02:02:23.875931 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 02:02:23.875941 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 02:02:23.875950 kernel: ACPI: Added _OSI(Module Device) Dec 13 02:02:23.875960 kernel: ACPI: Added _OSI(Processor Device) Dec 13 02:02:23.875970 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 02:02:23.875979 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 02:02:23.875990 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 02:02:23.876000 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 02:02:23.876009 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 02:02:23.876019 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 02:02:23.876029 kernel: ACPI: Interpreter enabled Dec 13 02:02:23.876038 kernel: ACPI: PM: (supports S0 S3 S5) Dec 13 02:02:23.876048 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 02:02:23.876069 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 02:02:23.876079 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Dec 13 02:02:23.876106 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 13 02:02:23.876256 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Dec 13 02:02:23.876352 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] Dec 13 02:02:23.876455 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] Dec 13 02:02:23.876469 kernel: PCI host bridge to bus 0000:00 Dec 13 02:02:23.876561 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 02:02:23.876645 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 02:02:23.876732 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 02:02:23.876813 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] Dec 13 02:02:23.876902 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Dec 13 02:02:23.876984 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x8ffffffff window] Dec 13 02:02:23.877079 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 13 02:02:23.877191 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Dec 13 02:02:23.877295 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 Dec 13 02:02:23.877401 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfd000000-0xfdffffff pref] Dec 13 02:02:23.877496 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xfebd0000-0xfebd0fff] Dec 13 02:02:23.877589 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfebc0000-0xfebcffff pref] Dec 13 02:02:23.877682 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 02:02:23.877789 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 Dec 13 02:02:23.877890 kernel: pci 0000:00:02.0: reg 0x10: [io 0xc0c0-0xc0df] Dec 13 02:02:23.877993 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xfebd1000-0xfebd1fff] Dec 13 02:02:23.878104 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfe000000-0xfe003fff 64bit pref] Dec 13 02:02:23.878207 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 Dec 13 02:02:23.878391 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc000-0xc07f] Dec 13 02:02:23.878512 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebd2000-0xfebd2fff] Dec 13 02:02:23.878607 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe004000-0xfe007fff 64bit pref] Dec 13 02:02:23.878709 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Dec 13 02:02:23.878807 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc0e0-0xc0ff] Dec 13 02:02:23.878898 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebd3000-0xfebd3fff] Dec 13 02:02:23.878990 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe008000-0xfe00bfff 64bit pref] Dec 13 02:02:23.879102 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfeb80000-0xfebbffff pref] Dec 13 02:02:23.879210 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Dec 13 02:02:23.879304 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Dec 13 02:02:23.879432 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Dec 13 02:02:23.879530 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc100-0xc11f] Dec 13 02:02:23.879620 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfebd4000-0xfebd4fff] Dec 13 02:02:23.879720 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Dec 13 02:02:23.879817 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] Dec 13 02:02:23.879830 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 13 02:02:23.879840 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 13 02:02:23.879850 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 02:02:23.879862 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 13 02:02:23.879872 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 Dec 13 02:02:23.879881 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 Dec 13 02:02:23.879890 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Dec 13 02:02:23.879899 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Dec 13 02:02:23.879909 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 Dec 13 02:02:23.879918 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 Dec 13 02:02:23.879927 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 Dec 13 02:02:23.879937 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 Dec 13 02:02:23.879948 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 Dec 13 02:02:23.879957 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 Dec 13 02:02:23.879967 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 Dec 13 02:02:23.879976 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 Dec 13 02:02:23.879985 kernel: iommu: Default domain type: Translated Dec 13 02:02:23.879994 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 02:02:23.880105 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Dec 13 02:02:23.880200 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 02:02:23.880296 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Dec 13 02:02:23.880309 kernel: vgaarb: loaded Dec 13 02:02:23.880319 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 02:02:23.880329 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 02:02:23.880338 kernel: PTP clock support registered Dec 13 02:02:23.880347 kernel: PCI: Using ACPI for IRQ routing Dec 13 02:02:23.880356 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 02:02:23.880374 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Dec 13 02:02:23.880384 kernel: e820: reserve RAM buffer [mem 0x9cfdc000-0x9fffffff] Dec 13 02:02:23.880395 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Dec 13 02:02:23.880405 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Dec 13 02:02:23.880414 kernel: clocksource: Switched to clocksource kvm-clock Dec 13 02:02:23.880423 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 02:02:23.880433 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 02:02:23.880443 kernel: pnp: PnP ACPI init Dec 13 02:02:23.880552 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved Dec 13 02:02:23.880567 kernel: pnp: PnP ACPI: found 6 devices Dec 13 02:02:23.880577 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 02:02:23.880589 kernel: NET: Registered PF_INET protocol family Dec 13 02:02:23.880598 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 02:02:23.880608 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Dec 13 02:02:23.880617 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 02:02:23.880627 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 02:02:23.880636 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Dec 13 02:02:23.880645 kernel: TCP: Hash tables configured (established 32768 bind 32768) Dec 13 02:02:23.880655 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 02:02:23.880666 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 02:02:23.880676 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 02:02:23.880685 kernel: NET: Registered PF_XDP protocol family Dec 13 02:02:23.880776 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 02:02:23.880859 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 02:02:23.880941 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 02:02:23.881023 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] Dec 13 02:02:23.881123 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Dec 13 02:02:23.881206 kernel: pci_bus 0000:00: resource 9 [mem 0x100000000-0x8ffffffff window] Dec 13 02:02:23.881222 kernel: PCI: CLS 0 bytes, default 64 Dec 13 02:02:23.881231 kernel: Initialise system trusted keyrings Dec 13 02:02:23.881241 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Dec 13 02:02:23.881250 kernel: Key type asymmetric registered Dec 13 02:02:23.881259 kernel: Asymmetric key parser 'x509' registered Dec 13 02:02:23.881268 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 02:02:23.881277 kernel: io scheduler mq-deadline registered Dec 13 02:02:23.881286 kernel: io scheduler kyber registered Dec 13 02:02:23.881296 kernel: io scheduler bfq registered Dec 13 02:02:23.881307 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 02:02:23.881317 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 Dec 13 02:02:23.881326 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 Dec 13 02:02:23.881336 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 Dec 13 02:02:23.881345 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 02:02:23.881354 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 02:02:23.881372 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 13 02:02:23.881382 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 02:02:23.881391 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 02:02:23.881403 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 02:02:23.881498 kernel: rtc_cmos 00:04: RTC can wake from S4 Dec 13 02:02:23.881584 kernel: rtc_cmos 00:04: registered as rtc0 Dec 13 02:02:23.881684 kernel: rtc_cmos 00:04: setting system clock to 2024-12-13T02:02:23 UTC (1734055343) Dec 13 02:02:23.881770 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Dec 13 02:02:23.881783 kernel: NET: Registered PF_INET6 protocol family Dec 13 02:02:23.881792 kernel: Segment Routing with IPv6 Dec 13 02:02:23.881801 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 02:02:23.881814 kernel: NET: Registered PF_PACKET protocol family Dec 13 02:02:23.881824 kernel: Key type dns_resolver registered Dec 13 02:02:23.881833 kernel: IPI shorthand broadcast: enabled Dec 13 02:02:23.881842 kernel: sched_clock: Marking stable (438279250, 103150105)->(561543765, -20114410) Dec 13 02:02:23.881851 kernel: registered taskstats version 1 Dec 13 02:02:23.881875 kernel: Loading compiled-in X.509 certificates Dec 13 02:02:23.881884 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: d9defb0205602bee9bb670636cbe5c74194fdb5e' Dec 13 02:02:23.881894 kernel: Key type .fscrypt registered Dec 13 02:02:23.881903 kernel: Key type fscrypt-provisioning registered Dec 13 02:02:23.881914 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 02:02:23.881923 kernel: ima: Allocated hash algorithm: sha1 Dec 13 02:02:23.881933 kernel: ima: No architecture policies found Dec 13 02:02:23.881956 kernel: clk: Disabling unused clocks Dec 13 02:02:23.881966 kernel: Freeing unused kernel image (initmem) memory: 47476K Dec 13 02:02:23.881975 kernel: Write protecting the kernel read-only data: 28672k Dec 13 02:02:23.881985 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 02:02:23.881994 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 02:02:23.882005 kernel: Run /init as init process Dec 13 02:02:23.882015 kernel: with arguments: Dec 13 02:02:23.882036 kernel: /init Dec 13 02:02:23.882046 kernel: with environment: Dec 13 02:02:23.882054 kernel: HOME=/ Dec 13 02:02:23.882075 kernel: TERM=linux Dec 13 02:02:23.882084 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 02:02:23.882097 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 02:02:23.882123 systemd[1]: Detected virtualization kvm. Dec 13 02:02:23.882137 systemd[1]: Detected architecture x86-64. Dec 13 02:02:23.882147 systemd[1]: Running in initrd. Dec 13 02:02:23.882156 systemd[1]: No hostname configured, using default hostname. Dec 13 02:02:23.882166 systemd[1]: Hostname set to . Dec 13 02:02:23.882177 systemd[1]: Initializing machine ID from VM UUID. Dec 13 02:02:23.882199 systemd[1]: Queued start job for default target initrd.target. Dec 13 02:02:23.882210 systemd[1]: Started systemd-ask-password-console.path. Dec 13 02:02:23.882220 systemd[1]: Reached target cryptsetup.target. Dec 13 02:02:23.882232 systemd[1]: Reached target paths.target. Dec 13 02:02:23.882259 systemd[1]: Reached target slices.target. Dec 13 02:02:23.882276 systemd[1]: Reached target swap.target. Dec 13 02:02:23.882286 systemd[1]: Reached target timers.target. Dec 13 02:02:23.882296 systemd[1]: Listening on iscsid.socket. Dec 13 02:02:23.882308 systemd[1]: Listening on iscsiuio.socket. Dec 13 02:02:23.882318 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 02:02:23.882342 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 02:02:23.882352 systemd[1]: Listening on systemd-journald.socket. Dec 13 02:02:23.882370 systemd[1]: Listening on systemd-networkd.socket. Dec 13 02:02:23.882381 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 02:02:23.882391 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 02:02:23.882401 systemd[1]: Reached target sockets.target. Dec 13 02:02:23.882411 systemd[1]: Starting kmod-static-nodes.service... Dec 13 02:02:23.882424 systemd[1]: Finished network-cleanup.service. Dec 13 02:02:23.882434 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 02:02:23.882444 systemd[1]: Starting systemd-journald.service... Dec 13 02:02:23.882454 systemd[1]: Starting systemd-modules-load.service... Dec 13 02:02:23.882464 systemd[1]: Starting systemd-resolved.service... Dec 13 02:02:23.882475 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 02:02:23.882494 systemd[1]: Finished kmod-static-nodes.service. Dec 13 02:02:23.882508 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 02:02:23.882519 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 02:02:23.882535 systemd-journald[198]: Journal started Dec 13 02:02:23.882593 systemd-journald[198]: Runtime Journal (/run/log/journal/a626d777ccaf4a5abca3cd4bfbfd5de1) is 6.0M, max 48.5M, 42.5M free. Dec 13 02:02:23.868001 systemd-modules-load[199]: Inserted module 'overlay' Dec 13 02:02:23.910348 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 02:02:23.910380 kernel: Bridge firewalling registered Dec 13 02:02:23.894010 systemd-resolved[200]: Positive Trust Anchors: Dec 13 02:02:23.894021 systemd-resolved[200]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 02:02:23.914240 systemd[1]: Started systemd-journald.service. Dec 13 02:02:23.894070 systemd-resolved[200]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 02:02:23.924318 kernel: audit: type=1130 audit(1734055343.915:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:23.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:23.896832 systemd-resolved[200]: Defaulting to hostname 'linux'. Dec 13 02:02:23.929220 kernel: audit: type=1130 audit(1734055343.925:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:23.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:23.909216 systemd-modules-load[199]: Inserted module 'br_netfilter' Dec 13 02:02:23.930000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:23.915317 systemd[1]: Started systemd-resolved.service. Dec 13 02:02:23.936635 kernel: audit: type=1130 audit(1734055343.930:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:23.936652 kernel: SCSI subsystem initialized Dec 13 02:02:23.936663 kernel: audit: type=1130 audit(1734055343.934:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:23.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:23.925476 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 02:02:23.930351 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 02:02:23.934427 systemd[1]: Reached target nss-lookup.target. Dec 13 02:02:23.942024 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 02:02:23.950571 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 02:02:23.950591 kernel: device-mapper: uevent: version 1.0.3 Dec 13 02:02:23.952126 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 02:02:23.954906 systemd-modules-load[199]: Inserted module 'dm_multipath' Dec 13 02:02:23.955651 systemd[1]: Finished systemd-modules-load.service. Dec 13 02:02:23.955000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:23.956411 systemd[1]: Starting systemd-sysctl.service... Dec 13 02:02:23.960081 kernel: audit: type=1130 audit(1734055343.955:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:23.965662 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 02:02:23.970435 kernel: audit: type=1130 audit(1734055343.965:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:23.965000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:23.966330 systemd[1]: Starting dracut-cmdline.service... Dec 13 02:02:23.973171 systemd[1]: Finished systemd-sysctl.service. Dec 13 02:02:23.974000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:23.977915 dracut-cmdline[223]: dracut-dracut-053 Dec 13 02:02:23.978789 kernel: audit: type=1130 audit(1734055343.974:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:23.980453 dracut-cmdline[223]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 02:02:24.030102 kernel: Loading iSCSI transport class v2.0-870. Dec 13 02:02:24.048098 kernel: iscsi: registered transport (tcp) Dec 13 02:02:24.069103 kernel: iscsi: registered transport (qla4xxx) Dec 13 02:02:24.069171 kernel: QLogic iSCSI HBA Driver Dec 13 02:02:24.097248 systemd[1]: Finished dracut-cmdline.service. Dec 13 02:02:24.103097 kernel: audit: type=1130 audit(1734055344.098:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:24.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:24.099283 systemd[1]: Starting dracut-pre-udev.service... Dec 13 02:02:24.144087 kernel: raid6: avx2x4 gen() 30525 MB/s Dec 13 02:02:24.161082 kernel: raid6: avx2x4 xor() 8110 MB/s Dec 13 02:02:24.178079 kernel: raid6: avx2x2 gen() 32362 MB/s Dec 13 02:02:24.195080 kernel: raid6: avx2x2 xor() 12604 MB/s Dec 13 02:02:24.212090 kernel: raid6: avx2x1 gen() 19598 MB/s Dec 13 02:02:24.229081 kernel: raid6: avx2x1 xor() 15359 MB/s Dec 13 02:02:24.246083 kernel: raid6: sse2x4 gen() 14834 MB/s Dec 13 02:02:24.263087 kernel: raid6: sse2x4 xor() 7563 MB/s Dec 13 02:02:24.280078 kernel: raid6: sse2x2 gen() 16467 MB/s Dec 13 02:02:24.297081 kernel: raid6: sse2x2 xor() 9854 MB/s Dec 13 02:02:24.314087 kernel: raid6: sse2x1 gen() 12433 MB/s Dec 13 02:02:24.331479 kernel: raid6: sse2x1 xor() 7792 MB/s Dec 13 02:02:24.331498 kernel: raid6: using algorithm avx2x2 gen() 32362 MB/s Dec 13 02:02:24.331508 kernel: raid6: .... xor() 12604 MB/s, rmw enabled Dec 13 02:02:24.332201 kernel: raid6: using avx2x2 recovery algorithm Dec 13 02:02:24.344079 kernel: xor: automatically using best checksumming function avx Dec 13 02:02:24.432099 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 02:02:24.438715 systemd[1]: Finished dracut-pre-udev.service. Dec 13 02:02:24.443274 kernel: audit: type=1130 audit(1734055344.439:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:24.439000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:24.443000 audit: BPF prog-id=7 op=LOAD Dec 13 02:02:24.443000 audit: BPF prog-id=8 op=LOAD Dec 13 02:02:24.443577 systemd[1]: Starting systemd-udevd.service... Dec 13 02:02:24.455314 systemd-udevd[400]: Using default interface naming scheme 'v252'. Dec 13 02:02:24.458646 systemd[1]: Started systemd-udevd.service. Dec 13 02:02:24.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:24.460550 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 02:02:24.470398 dracut-pre-trigger[406]: rd.md=0: removing MD RAID activation Dec 13 02:02:24.489890 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 02:02:24.490000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:24.491483 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 02:02:24.526471 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 02:02:24.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:24.550757 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Dec 13 02:02:24.570929 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 02:02:24.570946 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 02:02:24.570955 kernel: GPT:9289727 != 19775487 Dec 13 02:02:24.570963 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 02:02:24.570972 kernel: GPT:9289727 != 19775487 Dec 13 02:02:24.570980 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 02:02:24.570988 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 02:02:24.581382 kernel: libata version 3.00 loaded. Dec 13 02:02:24.581424 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 02:02:24.581437 kernel: AES CTR mode by8 optimization enabled Dec 13 02:02:24.591079 kernel: ahci 0000:00:1f.2: version 3.0 Dec 13 02:02:24.591357 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 Dec 13 02:02:24.591373 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Dec 13 02:02:24.591484 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Dec 13 02:02:24.591575 kernel: scsi host0: ahci Dec 13 02:02:24.591694 kernel: scsi host1: ahci Dec 13 02:02:24.591808 kernel: scsi host2: ahci Dec 13 02:02:24.591927 kernel: scsi host3: ahci Dec 13 02:02:24.592051 kernel: scsi host4: ahci Dec 13 02:02:24.592201 kernel: scsi host5: ahci Dec 13 02:02:24.592310 kernel: ata1: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4100 irq 34 Dec 13 02:02:24.592327 kernel: ata2: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4180 irq 34 Dec 13 02:02:24.592339 kernel: ata3: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4200 irq 34 Dec 13 02:02:24.592363 kernel: ata4: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4280 irq 34 Dec 13 02:02:24.592375 kernel: ata5: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4300 irq 34 Dec 13 02:02:24.592387 kernel: ata6: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4380 irq 34 Dec 13 02:02:24.595089 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (456) Dec 13 02:02:24.598151 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 02:02:24.634138 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 02:02:24.637859 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 02:02:24.639021 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 02:02:24.644720 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 02:02:24.647500 systemd[1]: Starting disk-uuid.service... Dec 13 02:02:24.825052 disk-uuid[531]: Primary Header is updated. Dec 13 02:02:24.825052 disk-uuid[531]: Secondary Entries is updated. Dec 13 02:02:24.825052 disk-uuid[531]: Secondary Header is updated. Dec 13 02:02:24.828821 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 02:02:24.832086 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 02:02:24.836086 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 02:02:24.902084 kernel: ata6: SATA link down (SStatus 0 SControl 300) Dec 13 02:02:24.902133 kernel: ata5: SATA link down (SStatus 0 SControl 300) Dec 13 02:02:24.903946 kernel: ata4: SATA link down (SStatus 0 SControl 300) Dec 13 02:02:24.904087 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) Dec 13 02:02:24.906088 kernel: ata1: SATA link down (SStatus 0 SControl 300) Dec 13 02:02:24.906112 kernel: ata2: SATA link down (SStatus 0 SControl 300) Dec 13 02:02:24.907102 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Dec 13 02:02:24.908536 kernel: ata3.00: applying bridge limits Dec 13 02:02:24.909225 kernel: ata3.00: configured for UDMA/100 Dec 13 02:02:24.910083 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Dec 13 02:02:24.945517 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Dec 13 02:02:24.962665 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Dec 13 02:02:24.962684 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Dec 13 02:02:25.877840 disk-uuid[532]: The operation has completed successfully. Dec 13 02:02:25.880030 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 02:02:25.900218 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 02:02:25.901000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:25.901000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:25.900324 systemd[1]: Finished disk-uuid.service. Dec 13 02:02:25.905096 systemd[1]: Starting verity-setup.service... Dec 13 02:02:25.918091 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" Dec 13 02:02:25.938020 systemd[1]: Found device dev-mapper-usr.device. Dec 13 02:02:25.940114 systemd[1]: Mounting sysusr-usr.mount... Dec 13 02:02:25.942166 systemd[1]: Finished verity-setup.service. Dec 13 02:02:25.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:26.012714 systemd[1]: Mounted sysusr-usr.mount. Dec 13 02:02:26.015022 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 02:02:26.013647 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 02:02:26.014284 systemd[1]: Starting ignition-setup.service... Dec 13 02:02:26.015459 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 02:02:26.023148 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 02:02:26.023169 kernel: BTRFS info (device vda6): using free space tree Dec 13 02:02:26.023183 kernel: BTRFS info (device vda6): has skinny extents Dec 13 02:02:26.032133 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 02:02:26.075221 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 02:02:26.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:26.076000 audit: BPF prog-id=9 op=LOAD Dec 13 02:02:26.077419 systemd[1]: Starting systemd-networkd.service... Dec 13 02:02:26.095948 systemd-networkd[717]: lo: Link UP Dec 13 02:02:26.095957 systemd-networkd[717]: lo: Gained carrier Dec 13 02:02:26.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:26.096345 systemd-networkd[717]: Enumeration completed Dec 13 02:02:26.096440 systemd[1]: Started systemd-networkd.service. Dec 13 02:02:26.096531 systemd-networkd[717]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 02:02:26.097382 systemd-networkd[717]: eth0: Link UP Dec 13 02:02:26.097384 systemd-networkd[717]: eth0: Gained carrier Dec 13 02:02:26.098210 systemd[1]: Reached target network.target. Dec 13 02:02:26.105000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:26.100449 systemd[1]: Starting iscsiuio.service... Dec 13 02:02:26.104425 systemd[1]: Started iscsiuio.service. Dec 13 02:02:26.107081 systemd[1]: Starting iscsid.service... Dec 13 02:02:26.109924 iscsid[722]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 02:02:26.109924 iscsid[722]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Dec 13 02:02:26.109924 iscsid[722]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 02:02:26.109924 iscsid[722]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 02:02:26.109924 iscsid[722]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 02:02:26.109924 iscsid[722]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 02:02:26.109924 iscsid[722]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 02:02:26.112000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:26.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:26.111025 systemd[1]: Started iscsid.service. Dec 13 02:02:26.112137 systemd-networkd[717]: eth0: DHCPv4 address 10.0.0.89/16, gateway 10.0.0.1 acquired from 10.0.0.1 Dec 13 02:02:26.143000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:26.112970 systemd[1]: Starting dracut-initqueue.service... Dec 13 02:02:26.129005 systemd[1]: Finished dracut-initqueue.service. Dec 13 02:02:26.132127 systemd[1]: Reached target remote-fs-pre.target. Dec 13 02:02:26.133854 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 02:02:26.133894 systemd[1]: Reached target remote-fs.target. Dec 13 02:02:26.134734 systemd[1]: Starting dracut-pre-mount.service... Dec 13 02:02:26.141555 systemd[1]: Finished dracut-pre-mount.service. Dec 13 02:02:26.349866 systemd[1]: Finished ignition-setup.service. Dec 13 02:02:26.350000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:26.351471 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 02:02:26.385676 ignition[737]: Ignition 2.14.0 Dec 13 02:02:26.385688 ignition[737]: Stage: fetch-offline Dec 13 02:02:26.385756 ignition[737]: no configs at "/usr/lib/ignition/base.d" Dec 13 02:02:26.385767 ignition[737]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 02:02:26.385891 ignition[737]: parsed url from cmdline: "" Dec 13 02:02:26.385896 ignition[737]: no config URL provided Dec 13 02:02:26.385901 ignition[737]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 02:02:26.385910 ignition[737]: no config at "/usr/lib/ignition/user.ign" Dec 13 02:02:26.385937 ignition[737]: op(1): [started] loading QEMU firmware config module Dec 13 02:02:26.385942 ignition[737]: op(1): executing: "modprobe" "qemu_fw_cfg" Dec 13 02:02:26.395367 ignition[737]: op(1): [finished] loading QEMU firmware config module Dec 13 02:02:26.437403 ignition[737]: parsing config with SHA512: c4c88f20704eafa4eb76edb03ff77eb031b3452d01b853a6a0b2f7027795669030e36fce1f39bf35dd62adb1ec8d9b42ffe556a2d8ad0517e6fcdd403e6617db Dec 13 02:02:26.443113 unknown[737]: fetched base config from "system" Dec 13 02:02:26.443122 unknown[737]: fetched user config from "qemu" Dec 13 02:02:26.445204 ignition[737]: fetch-offline: fetch-offline passed Dec 13 02:02:26.446032 ignition[737]: Ignition finished successfully Dec 13 02:02:26.447158 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 02:02:26.448000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:26.448174 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Dec 13 02:02:26.448828 systemd[1]: Starting ignition-kargs.service... Dec 13 02:02:26.457838 ignition[745]: Ignition 2.14.0 Dec 13 02:02:26.457845 ignition[745]: Stage: kargs Dec 13 02:02:26.457933 ignition[745]: no configs at "/usr/lib/ignition/base.d" Dec 13 02:02:26.457941 ignition[745]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 02:02:26.460418 systemd[1]: Finished ignition-kargs.service. Dec 13 02:02:26.462000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:26.458928 ignition[745]: kargs: kargs passed Dec 13 02:02:26.463005 systemd[1]: Starting ignition-disks.service... Dec 13 02:02:26.458960 ignition[745]: Ignition finished successfully Dec 13 02:02:26.469729 ignition[751]: Ignition 2.14.0 Dec 13 02:02:26.469739 ignition[751]: Stage: disks Dec 13 02:02:26.469831 ignition[751]: no configs at "/usr/lib/ignition/base.d" Dec 13 02:02:26.469840 ignition[751]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 02:02:26.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:26.471464 systemd[1]: Finished ignition-disks.service. Dec 13 02:02:26.470720 ignition[751]: disks: disks passed Dec 13 02:02:26.473096 systemd[1]: Reached target initrd-root-device.target. Dec 13 02:02:26.470759 ignition[751]: Ignition finished successfully Dec 13 02:02:26.475012 systemd[1]: Reached target local-fs-pre.target. Dec 13 02:02:26.475854 systemd[1]: Reached target local-fs.target. Dec 13 02:02:26.476667 systemd[1]: Reached target sysinit.target. Dec 13 02:02:26.478198 systemd[1]: Reached target basic.target. Dec 13 02:02:26.479532 systemd[1]: Starting systemd-fsck-root.service... Dec 13 02:02:26.488928 systemd-fsck[759]: ROOT: clean, 621/553520 files, 56021/553472 blocks Dec 13 02:02:26.493388 systemd[1]: Finished systemd-fsck-root.service. Dec 13 02:02:26.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:26.495351 systemd[1]: Mounting sysroot.mount... Dec 13 02:02:26.501076 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 02:02:26.501394 systemd[1]: Mounted sysroot.mount. Dec 13 02:02:26.502150 systemd[1]: Reached target initrd-root-fs.target. Dec 13 02:02:26.504307 systemd[1]: Mounting sysroot-usr.mount... Dec 13 02:02:26.505549 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 02:02:26.505586 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 02:02:26.505609 systemd[1]: Reached target ignition-diskful.target. Dec 13 02:02:26.507467 systemd[1]: Mounted sysroot-usr.mount. Dec 13 02:02:26.513647 initrd-setup-root[769]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 02:02:26.509496 systemd[1]: Starting initrd-setup-root.service... Dec 13 02:02:26.516088 initrd-setup-root[777]: cut: /sysroot/etc/group: No such file or directory Dec 13 02:02:26.518229 initrd-setup-root[785]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 02:02:26.520328 initrd-setup-root[793]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 02:02:26.540187 systemd[1]: Finished initrd-setup-root.service. Dec 13 02:02:26.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:26.542500 systemd[1]: Starting ignition-mount.service... Dec 13 02:02:26.544455 systemd[1]: Starting sysroot-boot.service... Dec 13 02:02:26.546467 bash[810]: umount: /sysroot/usr/share/oem: not mounted. Dec 13 02:02:26.553104 ignition[811]: INFO : Ignition 2.14.0 Dec 13 02:02:26.553104 ignition[811]: INFO : Stage: mount Dec 13 02:02:26.553104 ignition[811]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 02:02:26.553104 ignition[811]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 02:02:26.557344 ignition[811]: INFO : mount: mount passed Dec 13 02:02:26.558143 ignition[811]: INFO : Ignition finished successfully Dec 13 02:02:26.559504 systemd[1]: Finished ignition-mount.service. Dec 13 02:02:26.559000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:26.563171 systemd[1]: Finished sysroot-boot.service. Dec 13 02:02:26.563000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:26.948959 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 02:02:26.954082 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (820) Dec 13 02:02:26.956147 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 02:02:26.956160 kernel: BTRFS info (device vda6): using free space tree Dec 13 02:02:26.956169 kernel: BTRFS info (device vda6): has skinny extents Dec 13 02:02:26.959438 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 02:02:26.961053 systemd[1]: Starting ignition-files.service... Dec 13 02:02:26.974403 ignition[840]: INFO : Ignition 2.14.0 Dec 13 02:02:26.974403 ignition[840]: INFO : Stage: files Dec 13 02:02:26.976888 ignition[840]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 02:02:26.976888 ignition[840]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 02:02:26.976888 ignition[840]: DEBUG : files: compiled without relabeling support, skipping Dec 13 02:02:26.980522 ignition[840]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 02:02:26.980522 ignition[840]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 02:02:26.983688 ignition[840]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 02:02:26.985222 ignition[840]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 02:02:26.987173 unknown[840]: wrote ssh authorized keys file for user: core Dec 13 02:02:26.988324 ignition[840]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 02:02:26.989929 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 02:02:26.992006 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Dec 13 02:02:27.035692 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Dec 13 02:02:27.100494 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 02:02:27.102841 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Dec 13 02:02:27.102841 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 02:02:27.102841 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Dec 13 02:02:27.102841 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Dec 13 02:02:27.102841 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 02:02:27.102841 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 02:02:27.102841 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 02:02:27.102841 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 02:02:27.102841 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 02:02:27.102841 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 02:02:27.102841 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 02:02:27.102841 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 02:02:27.102841 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 02:02:27.102841 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 Dec 13 02:02:27.103285 systemd-networkd[717]: eth0: Gained IPv6LL Dec 13 02:02:27.568137 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Dec 13 02:02:27.911857 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 02:02:27.911857 ignition[840]: INFO : files: op(b): [started] processing unit "prepare-helm.service" Dec 13 02:02:27.915696 ignition[840]: INFO : files: op(b): op(c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 02:02:27.917840 ignition[840]: INFO : files: op(b): op(c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 02:02:27.917840 ignition[840]: INFO : files: op(b): [finished] processing unit "prepare-helm.service" Dec 13 02:02:27.917840 ignition[840]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" Dec 13 02:02:27.922703 ignition[840]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 02:02:27.922703 ignition[840]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 02:02:27.922703 ignition[840]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" Dec 13 02:02:27.922703 ignition[840]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" Dec 13 02:02:27.930211 ignition[840]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" Dec 13 02:02:27.931882 ignition[840]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" Dec 13 02:02:27.931882 ignition[840]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 02:02:27.952162 ignition[840]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 02:02:27.954174 ignition[840]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" Dec 13 02:02:27.955867 ignition[840]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 02:02:27.957946 ignition[840]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 02:02:27.959967 ignition[840]: INFO : files: files passed Dec 13 02:02:27.960860 ignition[840]: INFO : Ignition finished successfully Dec 13 02:02:27.962946 systemd[1]: Finished ignition-files.service. Dec 13 02:02:27.963000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:27.964796 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 02:02:27.966842 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 02:02:27.967435 systemd[1]: Starting ignition-quench.service... Dec 13 02:02:27.972277 initrd-setup-root-after-ignition[865]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Dec 13 02:02:27.972000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:27.972000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:27.970270 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 02:02:27.974125 initrd-setup-root-after-ignition[867]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 02:02:27.970356 systemd[1]: Finished ignition-quench.service. Dec 13 02:02:27.974042 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 02:02:27.978000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:27.978982 systemd[1]: Reached target ignition-complete.target. Dec 13 02:02:27.981315 systemd[1]: Starting initrd-parse-etc.service... Dec 13 02:02:27.993264 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 02:02:27.994245 systemd[1]: Finished initrd-parse-etc.service. Dec 13 02:02:27.995000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:27.995000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:27.995970 systemd[1]: Reached target initrd-fs.target. Dec 13 02:02:27.997571 systemd[1]: Reached target initrd.target. Dec 13 02:02:27.999078 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 02:02:28.000826 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 02:02:28.010814 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 02:02:28.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:28.013123 systemd[1]: Starting initrd-cleanup.service... Dec 13 02:02:28.020626 systemd[1]: Stopped target nss-lookup.target. Dec 13 02:02:28.022301 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 02:02:28.024184 systemd[1]: Stopped target timers.target. Dec 13 02:02:28.025931 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 02:02:28.027011 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 02:02:28.028000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:28.028751 systemd[1]: Stopped target initrd.target. Dec 13 02:02:28.030325 systemd[1]: Stopped target basic.target. Dec 13 02:02:28.031844 systemd[1]: Stopped target ignition-complete.target. Dec 13 02:02:28.033631 systemd[1]: Stopped target ignition-diskful.target. Dec 13 02:02:28.035410 systemd[1]: Stopped target initrd-root-device.target. Dec 13 02:02:28.037229 systemd[1]: Stopped target remote-fs.target. Dec 13 02:02:28.038836 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 02:02:28.040549 systemd[1]: Stopped target sysinit.target. Dec 13 02:02:28.042116 systemd[1]: Stopped target local-fs.target. Dec 13 02:02:28.043686 systemd[1]: Stopped target local-fs-pre.target. Dec 13 02:02:28.045372 systemd[1]: Stopped target swap.target. Dec 13 02:02:28.046840 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 02:02:28.047821 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 02:02:28.049000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:28.049554 systemd[1]: Stopped target cryptsetup.target. Dec 13 02:02:28.051172 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 02:02:28.052160 systemd[1]: Stopped dracut-initqueue.service. Dec 13 02:02:28.053000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:28.053819 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 02:02:28.053899 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 02:02:28.055000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:28.056696 systemd[1]: Stopped target paths.target. Dec 13 02:02:28.058170 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 02:02:28.063102 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 02:02:28.064979 systemd[1]: Stopped target slices.target. Dec 13 02:02:28.066539 systemd[1]: Stopped target sockets.target. Dec 13 02:02:28.068142 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 02:02:28.069353 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 02:02:28.071000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:28.071415 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 02:02:28.072384 systemd[1]: Stopped ignition-files.service. Dec 13 02:02:28.073000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:28.074678 systemd[1]: Stopping ignition-mount.service... Dec 13 02:02:28.076327 systemd[1]: Stopping iscsid.service... Dec 13 02:02:28.077659 iscsid[722]: iscsid shutting down. Dec 13 02:02:28.078851 systemd[1]: Stopping sysroot-boot.service... Dec 13 02:02:28.081435 ignition[880]: INFO : Ignition 2.14.0 Dec 13 02:02:28.081435 ignition[880]: INFO : Stage: umount Dec 13 02:02:28.081435 ignition[880]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 02:02:28.081435 ignition[880]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 02:02:28.081000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:28.079644 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 02:02:28.086000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:28.087487 ignition[880]: INFO : umount: umount passed Dec 13 02:02:28.087487 ignition[880]: INFO : Ignition finished successfully Dec 13 02:02:28.079779 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 02:02:28.081544 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 02:02:28.083104 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 02:02:28.093595 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 02:02:28.094970 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 02:02:28.095862 systemd[1]: Stopped iscsid.service. Dec 13 02:02:28.097000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:28.097553 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 02:02:28.098535 systemd[1]: Stopped ignition-mount.service. Dec 13 02:02:28.100000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:28.100590 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 02:02:28.101659 systemd[1]: Closed iscsid.socket. Dec 13 02:02:28.103279 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 02:02:28.103314 systemd[1]: Stopped ignition-disks.service. Dec 13 02:02:28.105000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:28.105781 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 02:02:28.107000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:28.105811 systemd[1]: Stopped ignition-kargs.service. Dec 13 02:02:28.107587 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 02:02:28.107617 systemd[1]: Stopped ignition-setup.service. Dec 13 02:02:28.110000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:28.110868 systemd[1]: Stopping iscsiuio.service... Dec 13 02:02:28.112482 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 02:02:28.113813 systemd[1]: Finished initrd-cleanup.service. Dec 13 02:02:28.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:28.115000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:28.115768 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 02:02:28.116746 systemd[1]: Stopped iscsiuio.service. Dec 13 02:02:28.118000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:28.119054 systemd[1]: Stopped target network.target. Dec 13 02:02:28.120615 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 02:02:28.120640 systemd[1]: Closed iscsiuio.socket. Dec 13 02:02:28.122874 systemd[1]: Stopping systemd-networkd.service... Dec 13 02:02:28.124720 systemd[1]: Stopping systemd-resolved.service... Dec 13 02:02:28.126118 systemd-networkd[717]: eth0: DHCPv6 lease lost Dec 13 02:02:28.127855 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 02:02:28.129159 systemd[1]: Stopped systemd-networkd.service. Dec 13 02:02:28.131000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:28.131760 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 02:02:28.131790 systemd[1]: Closed systemd-networkd.socket. Dec 13 02:02:28.134953 systemd[1]: Stopping network-cleanup.service... Dec 13 02:02:28.135000 audit: BPF prog-id=9 op=UNLOAD Dec 13 02:02:28.136640 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 02:02:28.136686 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 02:02:28.138000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:28.139035 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 02:02:28.140083 systemd[1]: Stopped systemd-sysctl.service. Dec 13 02:02:28.141000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:28.142731 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 02:02:28.143819 systemd[1]: Stopped systemd-modules-load.service. Dec 13 02:02:28.145000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:28.145828 systemd[1]: Stopping systemd-udevd.service... Dec 13 02:02:28.148284 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 02:02:28.148666 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 02:02:28.148743 systemd[1]: Stopped systemd-resolved.service. Dec 13 02:02:28.151000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:28.153975 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 02:02:28.154195 systemd[1]: Stopped systemd-udevd.service. Dec 13 02:02:28.155000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:28.156010 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 02:02:28.156113 systemd[1]: Stopped network-cleanup.service. Dec 13 02:02:28.157000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:28.157705 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 02:02:28.159000 audit: BPF prog-id=6 op=UNLOAD Dec 13 02:02:28.157752 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 02:02:28.158122 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 02:02:28.167785 kernel: kauditd_printk_skb: 55 callbacks suppressed Dec 13 02:02:28.167809 kernel: audit: type=1131 audit(1734055348.163:66): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:28.163000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:28.158152 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 02:02:28.161982 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 02:02:28.179163 kernel: audit: type=1131 audit(1734055348.167:67): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:28.179188 kernel: audit: type=1131 audit(1734055348.174:68): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:28.167000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:28.174000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:28.162017 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 02:02:28.163654 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 02:02:28.163683 systemd[1]: Stopped dracut-cmdline.service. Dec 13 02:02:28.186356 kernel: audit: type=1131 audit(1734055348.182:69): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:28.182000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:28.168008 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 02:02:28.168044 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 02:02:28.191774 kernel: audit: type=1131 audit(1734055348.188:70): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:28.188000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:28.179189 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 02:02:28.196413 kernel: audit: type=1131 audit(1734055348.192:71): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:28.192000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:28.180038 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 13 02:02:28.201477 kernel: audit: type=1131 audit(1734055348.197:72): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:28.197000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:28.180102 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Dec 13 02:02:28.206475 kernel: audit: type=1131 audit(1734055348.202:73): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:28.202000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:28.186445 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 02:02:28.186487 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 02:02:28.188225 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 02:02:28.188274 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 02:02:28.193748 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Dec 13 02:02:28.194288 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 02:02:28.194390 systemd[1]: Stopped sysroot-boot.service. Dec 13 02:02:28.197260 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 02:02:28.197296 systemd[1]: Stopped initrd-setup-root.service. Dec 13 02:02:28.218475 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 02:02:28.218550 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 02:02:28.227588 kernel: audit: type=1130 audit(1734055348.219:74): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:28.227605 kernel: audit: type=1131 audit(1734055348.219:75): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:28.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:28.219000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:28.219652 systemd[1]: Reached target initrd-switch-root.target. Dec 13 02:02:28.230000 systemd[1]: Starting initrd-switch-root.service... Dec 13 02:02:28.246721 systemd[1]: Switching root. Dec 13 02:02:28.263714 systemd-journald[198]: Journal stopped Dec 13 02:02:30.885439 systemd-journald[198]: Received SIGTERM from PID 1 (systemd). Dec 13 02:02:30.885488 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 02:02:30.885506 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 02:02:30.885517 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 02:02:30.885526 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 02:02:30.885535 kernel: SELinux: policy capability open_perms=1 Dec 13 02:02:30.885545 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 02:02:30.885554 kernel: SELinux: policy capability always_check_network=0 Dec 13 02:02:30.885564 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 02:02:30.885573 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 02:02:30.885583 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 02:02:30.885593 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 02:02:30.885603 systemd[1]: Successfully loaded SELinux policy in 38.605ms. Dec 13 02:02:30.885621 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 10.203ms. Dec 13 02:02:30.885632 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 02:02:30.885643 systemd[1]: Detected virtualization kvm. Dec 13 02:02:30.885653 systemd[1]: Detected architecture x86-64. Dec 13 02:02:30.885662 systemd[1]: Detected first boot. Dec 13 02:02:30.885672 systemd[1]: Initializing machine ID from VM UUID. Dec 13 02:02:30.885685 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 02:02:30.885695 systemd[1]: Populated /etc with preset unit settings. Dec 13 02:02:30.885706 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:02:30.885719 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:02:30.885730 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:02:30.885743 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 02:02:30.885753 systemd[1]: Stopped initrd-switch-root.service. Dec 13 02:02:30.885763 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 02:02:30.885773 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 02:02:30.885787 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 02:02:30.885799 systemd[1]: Created slice system-getty.slice. Dec 13 02:02:30.885809 systemd[1]: Created slice system-modprobe.slice. Dec 13 02:02:30.885819 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 02:02:30.885831 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 02:02:30.885841 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 02:02:30.885851 systemd[1]: Created slice user.slice. Dec 13 02:02:30.885861 systemd[1]: Started systemd-ask-password-console.path. Dec 13 02:02:30.885871 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 02:02:30.885881 systemd[1]: Set up automount boot.automount. Dec 13 02:02:30.885891 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 02:02:30.885901 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 02:02:30.885911 systemd[1]: Stopped target initrd-fs.target. Dec 13 02:02:30.885924 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 02:02:30.885934 systemd[1]: Reached target integritysetup.target. Dec 13 02:02:30.885944 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 02:02:30.885954 systemd[1]: Reached target remote-fs.target. Dec 13 02:02:30.885964 systemd[1]: Reached target slices.target. Dec 13 02:02:30.885974 systemd[1]: Reached target swap.target. Dec 13 02:02:30.885984 systemd[1]: Reached target torcx.target. Dec 13 02:02:30.885994 systemd[1]: Reached target veritysetup.target. Dec 13 02:02:30.886006 systemd[1]: Listening on systemd-coredump.socket. Dec 13 02:02:30.886017 systemd[1]: Listening on systemd-initctl.socket. Dec 13 02:02:30.886027 systemd[1]: Listening on systemd-networkd.socket. Dec 13 02:02:30.886037 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 02:02:30.886047 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 02:02:30.886057 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 02:02:30.886084 systemd[1]: Mounting dev-hugepages.mount... Dec 13 02:02:30.886096 systemd[1]: Mounting dev-mqueue.mount... Dec 13 02:02:30.886106 systemd[1]: Mounting media.mount... Dec 13 02:02:30.886117 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:02:30.886129 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 02:02:30.886139 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 02:02:30.886149 systemd[1]: Mounting tmp.mount... Dec 13 02:02:30.886159 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 02:02:30.886177 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:02:30.886187 systemd[1]: Starting kmod-static-nodes.service... Dec 13 02:02:30.886198 systemd[1]: Starting modprobe@configfs.service... Dec 13 02:02:30.886207 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:02:30.886217 systemd[1]: Starting modprobe@drm.service... Dec 13 02:02:30.886229 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:02:30.886239 systemd[1]: Starting modprobe@fuse.service... Dec 13 02:02:30.886249 systemd[1]: Starting modprobe@loop.service... Dec 13 02:02:30.886259 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 02:02:30.886270 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 02:02:30.886280 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 02:02:30.886290 kernel: loop: module loaded Dec 13 02:02:30.886299 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 02:02:30.886309 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 02:02:30.886320 kernel: fuse: init (API version 7.34) Dec 13 02:02:30.886330 systemd[1]: Stopped systemd-journald.service. Dec 13 02:02:30.886339 systemd[1]: Starting systemd-journald.service... Dec 13 02:02:30.886349 systemd[1]: Starting systemd-modules-load.service... Dec 13 02:02:30.886359 systemd[1]: Starting systemd-network-generator.service... Dec 13 02:02:30.886369 systemd[1]: Starting systemd-remount-fs.service... Dec 13 02:02:30.886379 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 02:02:30.886389 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 02:02:30.886399 systemd[1]: Stopped verity-setup.service. Dec 13 02:02:30.886412 systemd-journald[994]: Journal started Dec 13 02:02:30.886448 systemd-journald[994]: Runtime Journal (/run/log/journal/a626d777ccaf4a5abca3cd4bfbfd5de1) is 6.0M, max 48.5M, 42.5M free. Dec 13 02:02:28.321000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 02:02:28.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 02:02:28.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 02:02:28.571000 audit: BPF prog-id=10 op=LOAD Dec 13 02:02:28.571000 audit: BPF prog-id=10 op=UNLOAD Dec 13 02:02:28.571000 audit: BPF prog-id=11 op=LOAD Dec 13 02:02:28.571000 audit: BPF prog-id=11 op=UNLOAD Dec 13 02:02:28.603000 audit[913]: AVC avc: denied { associate } for pid=913 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 02:02:28.603000 audit[913]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001cd8b2 a1=c000150de0 a2=c0001590c0 a3=32 items=0 ppid=896 pid=913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:28.603000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 02:02:28.604000 audit[913]: AVC avc: denied { associate } for pid=913 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 02:02:28.604000 audit[913]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001cd989 a2=1ed a3=0 items=2 ppid=896 pid=913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:28.604000 audit: CWD cwd="/" Dec 13 02:02:28.604000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:28.604000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:28.604000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 02:02:30.756000 audit: BPF prog-id=12 op=LOAD Dec 13 02:02:30.756000 audit: BPF prog-id=3 op=UNLOAD Dec 13 02:02:30.756000 audit: BPF prog-id=13 op=LOAD Dec 13 02:02:30.756000 audit: BPF prog-id=14 op=LOAD Dec 13 02:02:30.757000 audit: BPF prog-id=4 op=UNLOAD Dec 13 02:02:30.757000 audit: BPF prog-id=5 op=UNLOAD Dec 13 02:02:30.757000 audit: BPF prog-id=15 op=LOAD Dec 13 02:02:30.757000 audit: BPF prog-id=12 op=UNLOAD Dec 13 02:02:30.757000 audit: BPF prog-id=16 op=LOAD Dec 13 02:02:30.758000 audit: BPF prog-id=17 op=LOAD Dec 13 02:02:30.758000 audit: BPF prog-id=13 op=UNLOAD Dec 13 02:02:30.758000 audit: BPF prog-id=14 op=UNLOAD Dec 13 02:02:30.758000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:30.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:30.761000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:30.769000 audit: BPF prog-id=15 op=UNLOAD Dec 13 02:02:30.859000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:30.863000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:30.865000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:30.865000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:30.866000 audit: BPF prog-id=18 op=LOAD Dec 13 02:02:30.866000 audit: BPF prog-id=19 op=LOAD Dec 13 02:02:30.866000 audit: BPF prog-id=20 op=LOAD Dec 13 02:02:30.866000 audit: BPF prog-id=16 op=UNLOAD Dec 13 02:02:30.866000 audit: BPF prog-id=17 op=UNLOAD Dec 13 02:02:30.884000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 02:02:30.884000 audit[994]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffd80458760 a2=4000 a3=7ffd804587fc items=0 ppid=1 pid=994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:30.884000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 02:02:28.601594 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2024-12-13T02:02:28Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:02:30.755548 systemd[1]: Queued start job for default target multi-user.target. Dec 13 02:02:28.601794 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2024-12-13T02:02:28Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 02:02:30.755558 systemd[1]: Unnecessary job was removed for dev-vda6.device. Dec 13 02:02:30.887000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:28.601809 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2024-12-13T02:02:28Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 02:02:30.758559 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 02:02:28.601834 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2024-12-13T02:02:28Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 02:02:28.601843 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2024-12-13T02:02:28Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 02:02:28.601867 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2024-12-13T02:02:28Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 02:02:28.601878 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2024-12-13T02:02:28Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 02:02:28.602050 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2024-12-13T02:02:28Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 02:02:28.602115 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2024-12-13T02:02:28Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 02:02:28.602126 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2024-12-13T02:02:28Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 02:02:28.602751 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2024-12-13T02:02:28Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 02:02:28.602780 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2024-12-13T02:02:28Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 02:02:28.602795 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2024-12-13T02:02:28Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 02:02:28.602807 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2024-12-13T02:02:28Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 02:02:28.602822 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2024-12-13T02:02:28Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 02:02:28.602833 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2024-12-13T02:02:28Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 02:02:30.503719 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2024-12-13T02:02:30Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:02:30.504046 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2024-12-13T02:02:30Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:02:30.504174 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2024-12-13T02:02:30Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:02:30.504378 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2024-12-13T02:02:30Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:02:30.504436 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2024-12-13T02:02:30Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 02:02:30.504503 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2024-12-13T02:02:30Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 02:02:30.890109 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:02:30.893123 systemd[1]: Started systemd-journald.service. Dec 13 02:02:30.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:30.894578 systemd[1]: Mounted dev-hugepages.mount. Dec 13 02:02:30.895534 systemd[1]: Mounted dev-mqueue.mount. Dec 13 02:02:30.896449 systemd[1]: Mounted media.mount. Dec 13 02:02:30.897317 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 02:02:30.898316 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 02:02:30.899333 systemd[1]: Mounted tmp.mount. Dec 13 02:02:30.900355 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 02:02:30.901000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:30.901534 systemd[1]: Finished kmod-static-nodes.service. Dec 13 02:02:30.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:30.902682 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 02:02:30.902849 systemd[1]: Finished modprobe@configfs.service. Dec 13 02:02:30.903000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:30.903000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:30.904028 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:02:30.904217 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:02:30.905000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:30.905000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:30.905348 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 02:02:30.905461 systemd[1]: Finished modprobe@drm.service. Dec 13 02:02:30.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:30.906000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:30.906454 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:02:30.906567 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:02:30.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:30.907000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:30.907693 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 02:02:30.907804 systemd[1]: Finished modprobe@fuse.service. Dec 13 02:02:30.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:30.908000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:30.908774 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:02:30.908895 systemd[1]: Finished modprobe@loop.service. Dec 13 02:02:30.909000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:30.909000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:30.909907 systemd[1]: Finished systemd-modules-load.service. Dec 13 02:02:30.910000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:30.910977 systemd[1]: Finished systemd-network-generator.service. Dec 13 02:02:30.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:30.912133 systemd[1]: Finished systemd-remount-fs.service. Dec 13 02:02:30.912000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:30.913330 systemd[1]: Reached target network-pre.target. Dec 13 02:02:30.915095 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 02:02:30.916860 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 02:02:30.917605 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 02:02:30.918660 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 02:02:30.920238 systemd[1]: Starting systemd-journal-flush.service... Dec 13 02:02:30.921190 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:02:30.921839 systemd[1]: Starting systemd-random-seed.service... Dec 13 02:02:30.922815 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:02:30.923506 systemd[1]: Starting systemd-sysctl.service... Dec 13 02:02:30.925345 systemd[1]: Starting systemd-sysusers.service... Dec 13 02:02:30.927728 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 02:02:30.929674 systemd-journald[994]: Time spent on flushing to /var/log/journal/a626d777ccaf4a5abca3cd4bfbfd5de1 is 18.941ms for 1104 entries. Dec 13 02:02:30.929674 systemd-journald[994]: System Journal (/var/log/journal/a626d777ccaf4a5abca3cd4bfbfd5de1) is 8.0M, max 195.6M, 187.6M free. Dec 13 02:02:30.967877 systemd-journald[994]: Received client request to flush runtime journal. Dec 13 02:02:30.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:30.946000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:30.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:30.965000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:30.931231 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 02:02:30.944299 systemd[1]: Finished systemd-sysctl.service. Dec 13 02:02:30.945918 systemd[1]: Finished systemd-random-seed.service. Dec 13 02:02:30.946890 systemd[1]: Reached target first-boot-complete.target. Dec 13 02:02:30.951210 systemd[1]: Finished systemd-sysusers.service. Dec 13 02:02:30.952973 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 02:02:30.963813 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 02:02:30.965955 systemd[1]: Starting systemd-udev-settle.service... Dec 13 02:02:30.968595 systemd[1]: Finished systemd-journal-flush.service. Dec 13 02:02:30.969000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:30.972111 udevadm[1019]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Dec 13 02:02:30.973325 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 02:02:30.974000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:31.347832 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 02:02:31.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:31.349000 audit: BPF prog-id=21 op=LOAD Dec 13 02:02:31.349000 audit: BPF prog-id=22 op=LOAD Dec 13 02:02:31.349000 audit: BPF prog-id=7 op=UNLOAD Dec 13 02:02:31.349000 audit: BPF prog-id=8 op=UNLOAD Dec 13 02:02:31.350122 systemd[1]: Starting systemd-udevd.service... Dec 13 02:02:31.364611 systemd-udevd[1021]: Using default interface naming scheme 'v252'. Dec 13 02:02:31.376938 systemd[1]: Started systemd-udevd.service. Dec 13 02:02:31.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:31.378000 audit: BPF prog-id=23 op=LOAD Dec 13 02:02:31.379468 systemd[1]: Starting systemd-networkd.service... Dec 13 02:02:31.386000 audit: BPF prog-id=24 op=LOAD Dec 13 02:02:31.386000 audit: BPF prog-id=25 op=LOAD Dec 13 02:02:31.386000 audit: BPF prog-id=26 op=LOAD Dec 13 02:02:31.386969 systemd[1]: Starting systemd-userdbd.service... Dec 13 02:02:31.403549 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 02:02:31.410507 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 02:02:31.413309 systemd[1]: Started systemd-userdbd.service. Dec 13 02:02:31.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:31.452057 systemd-networkd[1031]: lo: Link UP Dec 13 02:02:31.453000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:31.452080 systemd-networkd[1031]: lo: Gained carrier Dec 13 02:02:31.452418 systemd-networkd[1031]: Enumeration completed Dec 13 02:02:31.452504 systemd-networkd[1031]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 02:02:31.452551 systemd[1]: Started systemd-networkd.service. Dec 13 02:02:31.454690 systemd-networkd[1031]: eth0: Link UP Dec 13 02:02:31.454696 systemd-networkd[1031]: eth0: Gained carrier Dec 13 02:02:31.458102 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Dec 13 02:02:31.462094 kernel: ACPI: button: Power Button [PWRF] Dec 13 02:02:31.458000 audit[1025]: AVC avc: denied { confidentiality } for pid=1025 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 02:02:31.458000 audit[1025]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55c97d741bc0 a1=337fc a2=7f3c079f3bc5 a3=5 items=110 ppid=1021 pid=1025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:31.458000 audit: CWD cwd="/" Dec 13 02:02:31.458000 audit: PATH item=0 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=1 name=(null) inode=12149 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=2 name=(null) inode=12149 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=3 name=(null) inode=12150 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=4 name=(null) inode=12149 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=5 name=(null) inode=12151 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=6 name=(null) inode=12149 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=7 name=(null) inode=12152 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=8 name=(null) inode=12152 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=9 name=(null) inode=12153 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=10 name=(null) inode=12152 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=11 name=(null) inode=12154 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=12 name=(null) inode=12152 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=13 name=(null) inode=12155 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=14 name=(null) inode=12152 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=15 name=(null) inode=12156 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=16 name=(null) inode=12152 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=17 name=(null) inode=12157 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=18 name=(null) inode=12149 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=19 name=(null) inode=12158 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=20 name=(null) inode=12158 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=21 name=(null) inode=12159 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=22 name=(null) inode=12158 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=23 name=(null) inode=12160 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=24 name=(null) inode=12158 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=25 name=(null) inode=12161 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=26 name=(null) inode=12158 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=27 name=(null) inode=12162 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=28 name=(null) inode=12158 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=29 name=(null) inode=12163 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=30 name=(null) inode=12149 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=31 name=(null) inode=12164 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=32 name=(null) inode=12164 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=33 name=(null) inode=12165 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=34 name=(null) inode=12164 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=35 name=(null) inode=12166 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=36 name=(null) inode=12164 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=37 name=(null) inode=12167 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=38 name=(null) inode=12164 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=39 name=(null) inode=12168 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=40 name=(null) inode=12164 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=41 name=(null) inode=12169 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=42 name=(null) inode=12149 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=43 name=(null) inode=12170 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=44 name=(null) inode=12170 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=45 name=(null) inode=12171 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=46 name=(null) inode=12170 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=47 name=(null) inode=12172 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=48 name=(null) inode=12170 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=49 name=(null) inode=12173 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=50 name=(null) inode=12170 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=51 name=(null) inode=12174 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=52 name=(null) inode=12170 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=53 name=(null) inode=12175 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=54 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=55 name=(null) inode=12176 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=56 name=(null) inode=12176 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=57 name=(null) inode=12177 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=58 name=(null) inode=12176 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=59 name=(null) inode=12178 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=60 name=(null) inode=12176 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=61 name=(null) inode=12179 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=62 name=(null) inode=12179 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=63 name=(null) inode=12180 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=64 name=(null) inode=12179 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=65 name=(null) inode=12181 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=66 name=(null) inode=12179 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=67 name=(null) inode=12182 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=68 name=(null) inode=12179 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=69 name=(null) inode=12183 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=70 name=(null) inode=12179 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=71 name=(null) inode=12184 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=72 name=(null) inode=12176 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=73 name=(null) inode=12185 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=74 name=(null) inode=12185 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=75 name=(null) inode=12186 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=76 name=(null) inode=12185 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=77 name=(null) inode=12187 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=78 name=(null) inode=12185 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=79 name=(null) inode=12188 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=80 name=(null) inode=12185 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=81 name=(null) inode=12189 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=82 name=(null) inode=12185 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=83 name=(null) inode=12190 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=84 name=(null) inode=12176 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=85 name=(null) inode=12191 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=86 name=(null) inode=12191 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=87 name=(null) inode=12192 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=88 name=(null) inode=12191 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=89 name=(null) inode=12193 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=90 name=(null) inode=12191 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=91 name=(null) inode=12194 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=92 name=(null) inode=12191 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=93 name=(null) inode=12195 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=94 name=(null) inode=12191 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=95 name=(null) inode=12196 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=96 name=(null) inode=12176 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=97 name=(null) inode=12197 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=98 name=(null) inode=12197 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=99 name=(null) inode=12198 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=100 name=(null) inode=12197 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=101 name=(null) inode=12199 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=102 name=(null) inode=12197 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=103 name=(null) inode=12200 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=104 name=(null) inode=12197 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=105 name=(null) inode=12201 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=106 name=(null) inode=12197 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=107 name=(null) inode=12202 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PATH item=109 name=(null) inode=12203 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:31.458000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 02:02:31.467210 systemd-networkd[1031]: eth0: DHCPv4 address 10.0.0.89/16, gateway 10.0.0.1 acquired from 10.0.0.1 Dec 13 02:02:31.479591 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Dec 13 02:02:31.480985 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Dec 13 02:02:31.481139 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Dec 13 02:02:31.487145 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Dec 13 02:02:31.491095 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 02:02:31.537101 kernel: kvm: Nested Virtualization enabled Dec 13 02:02:31.537280 kernel: SVM: kvm: Nested Paging enabled Dec 13 02:02:31.537306 kernel: SVM: Virtual VMLOAD VMSAVE supported Dec 13 02:02:31.537327 kernel: SVM: Virtual GIF supported Dec 13 02:02:31.555102 kernel: EDAC MC: Ver: 3.0.0 Dec 13 02:02:31.582469 systemd[1]: Finished systemd-udev-settle.service. Dec 13 02:02:31.583000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:31.584535 systemd[1]: Starting lvm2-activation-early.service... Dec 13 02:02:31.591126 lvm[1056]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 02:02:31.612642 systemd[1]: Finished lvm2-activation-early.service. Dec 13 02:02:31.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:31.613671 systemd[1]: Reached target cryptsetup.target. Dec 13 02:02:31.615499 systemd[1]: Starting lvm2-activation.service... Dec 13 02:02:31.618328 lvm[1057]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 02:02:31.642185 systemd[1]: Finished lvm2-activation.service. Dec 13 02:02:31.643000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:31.643204 systemd[1]: Reached target local-fs-pre.target. Dec 13 02:02:31.644039 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 02:02:31.644069 systemd[1]: Reached target local-fs.target. Dec 13 02:02:31.644878 systemd[1]: Reached target machines.target. Dec 13 02:02:31.646529 systemd[1]: Starting ldconfig.service... Dec 13 02:02:31.647492 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:02:31.647530 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:02:31.648341 systemd[1]: Starting systemd-boot-update.service... Dec 13 02:02:31.649900 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 02:02:31.651970 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 02:02:31.653729 systemd[1]: Starting systemd-sysext.service... Dec 13 02:02:31.655215 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1059 (bootctl) Dec 13 02:02:31.656035 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 02:02:31.663095 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 02:02:31.663000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:31.664319 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 02:02:31.668034 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 02:02:31.668216 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 02:02:31.676081 kernel: loop0: detected capacity change from 0 to 210664 Dec 13 02:02:31.694548 systemd-fsck[1068]: fsck.fat 4.2 (2021-01-31) Dec 13 02:02:31.694548 systemd-fsck[1068]: /dev/vda1: 789 files, 119291/258078 clusters Dec 13 02:02:31.695857 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 02:02:31.697000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:31.698631 systemd[1]: Mounting boot.mount... Dec 13 02:02:31.707802 systemd[1]: Mounted boot.mount. Dec 13 02:02:32.044511 systemd[1]: Finished systemd-boot-update.service. Dec 13 02:02:32.045084 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 02:02:32.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:32.061089 kernel: loop1: detected capacity change from 0 to 210664 Dec 13 02:02:32.091160 (sd-sysext)[1072]: Using extensions 'kubernetes'. Dec 13 02:02:32.091498 (sd-sysext)[1072]: Merged extensions into '/usr'. Dec 13 02:02:32.106517 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:02:32.107703 systemd[1]: Mounting usr-share-oem.mount... Dec 13 02:02:32.108814 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:02:32.109914 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:02:32.111833 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:02:32.113616 systemd[1]: Starting modprobe@loop.service... Dec 13 02:02:32.114593 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:02:32.114688 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:02:32.114779 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:02:32.117020 systemd[1]: Mounted usr-share-oem.mount. Dec 13 02:02:32.118218 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:02:32.118320 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:02:32.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:32.119000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:32.119625 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:02:32.119717 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:02:32.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:32.120000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:32.121028 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:02:32.121153 systemd[1]: Finished modprobe@loop.service. Dec 13 02:02:32.121219 ldconfig[1058]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 02:02:32.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:32.122000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:32.122544 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:02:32.122631 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:02:32.123466 systemd[1]: Finished systemd-sysext.service. Dec 13 02:02:32.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:32.125289 systemd[1]: Starting ensure-sysext.service... Dec 13 02:02:32.126745 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 02:02:32.134341 systemd[1]: Reloading. Dec 13 02:02:32.158606 systemd-tmpfiles[1079]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 02:02:32.159758 systemd-tmpfiles[1079]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 02:02:32.161081 systemd-tmpfiles[1079]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 02:02:32.185352 /usr/lib/systemd/system-generators/torcx-generator[1098]: time="2024-12-13T02:02:32Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:02:32.185654 /usr/lib/systemd/system-generators/torcx-generator[1098]: time="2024-12-13T02:02:32Z" level=info msg="torcx already run" Dec 13 02:02:32.270761 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:02:32.270779 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:02:32.289225 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:02:32.347000 audit: BPF prog-id=27 op=LOAD Dec 13 02:02:32.347000 audit: BPF prog-id=28 op=LOAD Dec 13 02:02:32.347000 audit: BPF prog-id=21 op=UNLOAD Dec 13 02:02:32.347000 audit: BPF prog-id=22 op=UNLOAD Dec 13 02:02:32.349000 audit: BPF prog-id=29 op=LOAD Dec 13 02:02:32.349000 audit: BPF prog-id=23 op=UNLOAD Dec 13 02:02:32.350000 audit: BPF prog-id=30 op=LOAD Dec 13 02:02:32.350000 audit: BPF prog-id=24 op=UNLOAD Dec 13 02:02:32.350000 audit: BPF prog-id=31 op=LOAD Dec 13 02:02:32.350000 audit: BPF prog-id=32 op=LOAD Dec 13 02:02:32.350000 audit: BPF prog-id=25 op=UNLOAD Dec 13 02:02:32.350000 audit: BPF prog-id=26 op=UNLOAD Dec 13 02:02:32.351000 audit: BPF prog-id=33 op=LOAD Dec 13 02:02:32.351000 audit: BPF prog-id=18 op=UNLOAD Dec 13 02:02:32.351000 audit: BPF prog-id=34 op=LOAD Dec 13 02:02:32.351000 audit: BPF prog-id=35 op=LOAD Dec 13 02:02:32.351000 audit: BPF prog-id=19 op=UNLOAD Dec 13 02:02:32.351000 audit: BPF prog-id=20 op=UNLOAD Dec 13 02:02:32.355274 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 02:02:32.356439 systemd[1]: Finished ldconfig.service. Dec 13 02:02:32.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:32.357528 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 02:02:32.358000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:32.359399 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 02:02:32.360000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:32.362937 systemd[1]: Starting audit-rules.service... Dec 13 02:02:32.364607 systemd[1]: Starting clean-ca-certificates.service... Dec 13 02:02:32.366545 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 02:02:32.368000 audit: BPF prog-id=36 op=LOAD Dec 13 02:02:32.369089 systemd[1]: Starting systemd-resolved.service... Dec 13 02:02:32.370000 audit: BPF prog-id=37 op=LOAD Dec 13 02:02:32.371267 systemd[1]: Starting systemd-timesyncd.service... Dec 13 02:02:32.373424 systemd[1]: Starting systemd-update-utmp.service... Dec 13 02:02:32.376108 systemd[1]: Finished clean-ca-certificates.service. Dec 13 02:02:32.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:32.378000 audit[1152]: SYSTEM_BOOT pid=1152 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 02:02:32.384305 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:02:32.384628 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:02:32.387040 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:02:32.389434 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:02:32.391775 systemd[1]: Starting modprobe@loop.service... Dec 13 02:02:32.392870 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:02:32.393001 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:02:32.393166 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 02:02:32.393331 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:02:32.394650 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 02:02:32.395000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 02:02:32.395000 audit[1164]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc3540f380 a2=420 a3=0 items=0 ppid=1140 pid=1164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.395000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 02:02:32.395898 augenrules[1164]: No rules Dec 13 02:02:32.396453 systemd[1]: Finished systemd-update-utmp.service. Dec 13 02:02:32.398072 systemd[1]: Finished audit-rules.service. Dec 13 02:02:32.399609 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:02:32.399740 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:02:32.401401 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:02:32.401527 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:02:32.403103 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:02:32.403245 systemd[1]: Finished modprobe@loop.service. Dec 13 02:02:32.407394 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:02:32.407636 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:02:32.409255 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:02:32.411560 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:02:32.413733 systemd[1]: Starting modprobe@loop.service... Dec 13 02:02:32.414765 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:02:32.414897 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:02:32.416209 systemd[1]: Starting systemd-update-done.service... Dec 13 02:02:32.417357 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 02:02:32.417469 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:02:32.418686 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:02:32.418827 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:02:32.420794 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:02:32.420969 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:02:32.422773 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:02:32.422936 systemd[1]: Finished modprobe@loop.service. Dec 13 02:02:32.424429 systemd[1]: Finished systemd-update-done.service. Dec 13 02:02:32.428876 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:02:32.429187 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:02:32.430879 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:02:32.433282 systemd[1]: Starting modprobe@drm.service... Dec 13 02:02:32.435386 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:02:32.437767 systemd-resolved[1144]: Positive Trust Anchors: Dec 13 02:02:32.437774 systemd-resolved[1144]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 02:02:32.437797 systemd[1]: Starting modprobe@loop.service... Dec 13 02:02:32.437801 systemd-resolved[1144]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 02:02:32.439044 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:02:32.439213 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:02:32.440549 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 02:02:32.442101 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 02:02:32.442247 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:02:32.443666 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:02:32.443827 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:02:32.445628 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 02:02:32.445767 systemd[1]: Finished modprobe@drm.service. Dec 13 02:02:33.399131 systemd[1]: Started systemd-timesyncd.service. Dec 13 02:02:33.399138 systemd-timesyncd[1150]: Contacted time server 10.0.0.1:123 (10.0.0.1). Dec 13 02:02:33.399181 systemd-timesyncd[1150]: Initial clock synchronization to Fri 2024-12-13 02:02:33.399065 UTC. Dec 13 02:02:33.400207 systemd-resolved[1144]: Defaulting to hostname 'linux'. Dec 13 02:02:33.400899 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:02:33.401038 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:02:33.402188 systemd[1]: Started systemd-resolved.service. Dec 13 02:02:33.403457 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:02:33.403556 systemd[1]: Finished modprobe@loop.service. Dec 13 02:02:33.405016 systemd[1]: Reached target network.target. Dec 13 02:02:33.406006 systemd[1]: Reached target nss-lookup.target. Dec 13 02:02:33.406869 systemd[1]: Reached target time-set.target. Dec 13 02:02:33.407787 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:02:33.407814 systemd[1]: Reached target sysinit.target. Dec 13 02:02:33.408781 systemd[1]: Started motdgen.path. Dec 13 02:02:33.409570 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 02:02:33.410823 systemd[1]: Started logrotate.timer. Dec 13 02:02:33.411684 systemd[1]: Started mdadm.timer. Dec 13 02:02:33.412466 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 02:02:33.413386 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 02:02:33.413413 systemd[1]: Reached target paths.target. Dec 13 02:02:33.414231 systemd[1]: Reached target timers.target. Dec 13 02:02:33.415285 systemd[1]: Listening on dbus.socket. Dec 13 02:02:33.416935 systemd[1]: Starting docker.socket... Dec 13 02:02:33.419772 systemd[1]: Listening on sshd.socket. Dec 13 02:02:33.420757 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:02:33.420797 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:02:33.421312 systemd[1]: Finished ensure-sysext.service. Dec 13 02:02:33.422295 systemd[1]: Listening on docker.socket. Dec 13 02:02:33.423855 systemd[1]: Reached target sockets.target. Dec 13 02:02:33.424713 systemd[1]: Reached target basic.target. Dec 13 02:02:33.425573 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 02:02:33.425595 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 02:02:33.426461 systemd[1]: Starting containerd.service... Dec 13 02:02:33.427973 systemd[1]: Starting dbus.service... Dec 13 02:02:33.429684 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 02:02:33.431713 systemd[1]: Starting extend-filesystems.service... Dec 13 02:02:33.433000 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 02:02:33.435429 jq[1184]: false Dec 13 02:02:33.433938 systemd[1]: Starting motdgen.service... Dec 13 02:02:33.436029 systemd[1]: Starting prepare-helm.service... Dec 13 02:02:33.438364 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 02:02:33.441624 systemd[1]: Starting sshd-keygen.service... Dec 13 02:02:33.444435 extend-filesystems[1185]: Found loop1 Dec 13 02:02:33.445780 extend-filesystems[1185]: Found sr0 Dec 13 02:02:33.445780 extend-filesystems[1185]: Found vda Dec 13 02:02:33.445780 extend-filesystems[1185]: Found vda1 Dec 13 02:02:33.445780 extend-filesystems[1185]: Found vda2 Dec 13 02:02:33.445780 extend-filesystems[1185]: Found vda3 Dec 13 02:02:33.445780 extend-filesystems[1185]: Found usr Dec 13 02:02:33.445780 extend-filesystems[1185]: Found vda4 Dec 13 02:02:33.445780 extend-filesystems[1185]: Found vda6 Dec 13 02:02:33.445780 extend-filesystems[1185]: Found vda7 Dec 13 02:02:33.445780 extend-filesystems[1185]: Found vda9 Dec 13 02:02:33.445780 extend-filesystems[1185]: Checking size of /dev/vda9 Dec 13 02:02:33.446299 systemd[1]: Starting systemd-logind.service... Dec 13 02:02:33.454213 dbus-daemon[1183]: [system] SELinux support is enabled Dec 13 02:02:33.448373 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:02:33.450443 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 02:02:33.453611 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 02:02:33.458574 systemd[1]: Starting update-engine.service... Dec 13 02:02:33.460614 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 02:02:33.462474 systemd[1]: Started dbus.service. Dec 13 02:02:33.465831 jq[1205]: true Dec 13 02:02:33.467037 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 02:02:33.467221 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 02:02:33.467507 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 02:02:33.467740 systemd[1]: Finished motdgen.service. Dec 13 02:02:33.469120 extend-filesystems[1185]: Resized partition /dev/vda9 Dec 13 02:02:33.471745 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 02:02:33.471965 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 02:02:33.474112 extend-filesystems[1209]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 02:02:33.480748 jq[1211]: true Dec 13 02:02:33.483900 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Dec 13 02:02:33.485781 tar[1210]: linux-amd64/helm Dec 13 02:02:33.486549 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 02:02:33.486576 systemd[1]: Reached target system-config.target. Dec 13 02:02:33.487911 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 02:02:33.487933 systemd[1]: Reached target user-config.target. Dec 13 02:02:33.501866 update_engine[1204]: I1213 02:02:33.501588 1204 main.cc:92] Flatcar Update Engine starting Dec 13 02:02:33.503670 systemd[1]: Started update-engine.service. Dec 13 02:02:33.503882 update_engine[1204]: I1213 02:02:33.503727 1204 update_check_scheduler.cc:74] Next update check in 4m59s Dec 13 02:02:33.506854 systemd[1]: Started locksmithd.service. Dec 13 02:02:33.513900 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Dec 13 02:02:33.531136 extend-filesystems[1209]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Dec 13 02:02:33.531136 extend-filesystems[1209]: old_desc_blocks = 1, new_desc_blocks = 1 Dec 13 02:02:33.531136 extend-filesystems[1209]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Dec 13 02:02:33.536420 extend-filesystems[1185]: Resized filesystem in /dev/vda9 Dec 13 02:02:33.531427 systemd-logind[1199]: Watching system buttons on /dev/input/event1 (Power Button) Dec 13 02:02:33.537609 env[1212]: time="2024-12-13T02:02:33.537003713Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 02:02:33.531442 systemd-logind[1199]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 02:02:33.532069 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 02:02:33.532225 systemd[1]: Finished extend-filesystems.service. Dec 13 02:02:33.537390 systemd-logind[1199]: New seat seat0. Dec 13 02:02:33.544264 systemd[1]: Started systemd-logind.service. Dec 13 02:02:33.547975 bash[1235]: Updated "/home/core/.ssh/authorized_keys" Dec 13 02:02:33.548637 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 02:02:33.556102 env[1212]: time="2024-12-13T02:02:33.556011950Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 02:02:33.556329 env[1212]: time="2024-12-13T02:02:33.556308446Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:02:33.557555 env[1212]: time="2024-12-13T02:02:33.557522353Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 02:02:33.557555 env[1212]: time="2024-12-13T02:02:33.557547069Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:02:33.557741 env[1212]: time="2024-12-13T02:02:33.557715896Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 02:02:33.557741 env[1212]: time="2024-12-13T02:02:33.557733539Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 02:02:33.557798 env[1212]: time="2024-12-13T02:02:33.557744259Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 02:02:33.557798 env[1212]: time="2024-12-13T02:02:33.557752584Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 02:02:33.557858 env[1212]: time="2024-12-13T02:02:33.557809361Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:02:33.558021 env[1212]: time="2024-12-13T02:02:33.557997233Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:02:33.558121 env[1212]: time="2024-12-13T02:02:33.558105977Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 02:02:33.558150 env[1212]: time="2024-12-13T02:02:33.558121346Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 02:02:33.558177 env[1212]: time="2024-12-13T02:02:33.558158966Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 02:02:33.558177 env[1212]: time="2024-12-13T02:02:33.558168154Z" level=info msg="metadata content store policy set" policy=shared Dec 13 02:02:33.563373 env[1212]: time="2024-12-13T02:02:33.563353448Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 02:02:33.563498 env[1212]: time="2024-12-13T02:02:33.563377473Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 02:02:33.563498 env[1212]: time="2024-12-13T02:02:33.563389736Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 02:02:33.563498 env[1212]: time="2024-12-13T02:02:33.563412849Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 02:02:33.563498 env[1212]: time="2024-12-13T02:02:33.563424822Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 02:02:33.563498 env[1212]: time="2024-12-13T02:02:33.563436183Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 02:02:33.563498 env[1212]: time="2024-12-13T02:02:33.563447534Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 02:02:33.563498 env[1212]: time="2024-12-13T02:02:33.563458796Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 02:02:33.563498 env[1212]: time="2024-12-13T02:02:33.563469015Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 02:02:33.563498 env[1212]: time="2024-12-13T02:02:33.563479595Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 02:02:33.563498 env[1212]: time="2024-12-13T02:02:33.563490054Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 02:02:33.563746 env[1212]: time="2024-12-13T02:02:33.563500754Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 02:02:33.563746 env[1212]: time="2024-12-13T02:02:33.563569954Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 02:02:33.563746 env[1212]: time="2024-12-13T02:02:33.563625638Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 02:02:33.563819 env[1212]: time="2024-12-13T02:02:33.563804163Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 02:02:33.563844 env[1212]: time="2024-12-13T02:02:33.563824131Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 02:02:33.563844 env[1212]: time="2024-12-13T02:02:33.563835191Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 02:02:33.563911 env[1212]: time="2024-12-13T02:02:33.563872271Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 02:02:33.563911 env[1212]: time="2024-12-13T02:02:33.563895364Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 02:02:33.563911 env[1212]: time="2024-12-13T02:02:33.563905664Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 02:02:33.564005 env[1212]: time="2024-12-13T02:02:33.563916023Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 02:02:33.564005 env[1212]: time="2024-12-13T02:02:33.563926122Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 02:02:33.564005 env[1212]: time="2024-12-13T02:02:33.563939126Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 02:02:33.564005 env[1212]: time="2024-12-13T02:02:33.563959404Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 02:02:33.564005 env[1212]: time="2024-12-13T02:02:33.563968421Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 02:02:33.564005 env[1212]: time="2024-12-13T02:02:33.563979773Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 02:02:33.564158 env[1212]: time="2024-12-13T02:02:33.564073869Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 02:02:33.564158 env[1212]: time="2024-12-13T02:02:33.564087084Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 02:02:33.564158 env[1212]: time="2024-12-13T02:02:33.564097053Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 02:02:33.564158 env[1212]: time="2024-12-13T02:02:33.564106430Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 02:02:33.564158 env[1212]: time="2024-12-13T02:02:33.564117311Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 02:02:33.564158 env[1212]: time="2024-12-13T02:02:33.564125877Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 02:02:33.564158 env[1212]: time="2024-12-13T02:02:33.564141316Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 02:02:33.564331 env[1212]: time="2024-12-13T02:02:33.564169739Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 02:02:33.564363 env[1212]: time="2024-12-13T02:02:33.564323607Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 02:02:33.564363 env[1212]: time="2024-12-13T02:02:33.564368992Z" level=info msg="Connect containerd service" Dec 13 02:02:33.564363 env[1212]: time="2024-12-13T02:02:33.564397035Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 02:02:33.565448 env[1212]: time="2024-12-13T02:02:33.564801183Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 02:02:33.565448 env[1212]: time="2024-12-13T02:02:33.565048898Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 02:02:33.565448 env[1212]: time="2024-12-13T02:02:33.565084194Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 02:02:33.565448 env[1212]: time="2024-12-13T02:02:33.565118979Z" level=info msg="containerd successfully booted in 0.048153s" Dec 13 02:02:33.565269 systemd[1]: Started containerd.service. Dec 13 02:02:33.569632 env[1212]: time="2024-12-13T02:02:33.569547875Z" level=info msg="Start subscribing containerd event" Dec 13 02:02:33.569632 env[1212]: time="2024-12-13T02:02:33.569595534Z" level=info msg="Start recovering state" Dec 13 02:02:33.569709 env[1212]: time="2024-12-13T02:02:33.569649155Z" level=info msg="Start event monitor" Dec 13 02:02:33.569709 env[1212]: time="2024-12-13T02:02:33.569661869Z" level=info msg="Start snapshots syncer" Dec 13 02:02:33.569709 env[1212]: time="2024-12-13T02:02:33.569672298Z" level=info msg="Start cni network conf syncer for default" Dec 13 02:02:33.569709 env[1212]: time="2024-12-13T02:02:33.569678890Z" level=info msg="Start streaming server" Dec 13 02:02:33.574474 locksmithd[1236]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 02:02:33.623994 systemd-networkd[1031]: eth0: Gained IPv6LL Dec 13 02:02:33.625732 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 02:02:33.627085 systemd[1]: Reached target network-online.target. Dec 13 02:02:33.629439 systemd[1]: Starting kubelet.service... Dec 13 02:02:33.910218 tar[1210]: linux-amd64/LICENSE Dec 13 02:02:33.910218 tar[1210]: linux-amd64/README.md Dec 13 02:02:33.913001 systemd[1]: Finished prepare-helm.service. Dec 13 02:02:34.220698 systemd[1]: Started kubelet.service. Dec 13 02:02:34.242506 sshd_keygen[1203]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 02:02:34.260191 systemd[1]: Finished sshd-keygen.service. Dec 13 02:02:34.262398 systemd[1]: Starting issuegen.service... Dec 13 02:02:34.267173 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 02:02:34.267288 systemd[1]: Finished issuegen.service. Dec 13 02:02:34.269218 systemd[1]: Starting systemd-user-sessions.service... Dec 13 02:02:34.275201 systemd[1]: Finished systemd-user-sessions.service. Dec 13 02:02:34.277345 systemd[1]: Started getty@tty1.service. Dec 13 02:02:34.279405 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 02:02:34.280471 systemd[1]: Reached target getty.target. Dec 13 02:02:34.281389 systemd[1]: Reached target multi-user.target. Dec 13 02:02:34.283211 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 02:02:34.289678 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 02:02:34.289802 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 02:02:34.291013 systemd[1]: Startup finished in 664ms (kernel) + 4.548s (initrd) + 5.058s (userspace) = 10.271s. Dec 13 02:02:34.633259 kubelet[1250]: E1213 02:02:34.633150 1250 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 02:02:34.634499 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 02:02:34.634613 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 02:02:42.502020 systemd[1]: Created slice system-sshd.slice. Dec 13 02:02:42.502935 systemd[1]: Started sshd@0-10.0.0.89:22-10.0.0.1:59776.service. Dec 13 02:02:42.542734 sshd[1274]: Accepted publickey for core from 10.0.0.1 port 59776 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:02:42.543928 sshd[1274]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:02:42.551750 systemd-logind[1199]: New session 1 of user core. Dec 13 02:02:42.552552 systemd[1]: Created slice user-500.slice. Dec 13 02:02:42.553388 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 02:02:42.560158 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 02:02:42.561130 systemd[1]: Starting user@500.service... Dec 13 02:02:42.563481 (systemd)[1277]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:02:42.626404 systemd[1277]: Queued start job for default target default.target. Dec 13 02:02:42.626794 systemd[1277]: Reached target paths.target. Dec 13 02:02:42.626814 systemd[1277]: Reached target sockets.target. Dec 13 02:02:42.626825 systemd[1277]: Reached target timers.target. Dec 13 02:02:42.626835 systemd[1277]: Reached target basic.target. Dec 13 02:02:42.626867 systemd[1277]: Reached target default.target. Dec 13 02:02:42.626902 systemd[1277]: Startup finished in 59ms. Dec 13 02:02:42.626978 systemd[1]: Started user@500.service. Dec 13 02:02:42.627945 systemd[1]: Started session-1.scope. Dec 13 02:02:42.678203 systemd[1]: Started sshd@1-10.0.0.89:22-10.0.0.1:59784.service. Dec 13 02:02:42.715937 sshd[1286]: Accepted publickey for core from 10.0.0.1 port 59784 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:02:42.717120 sshd[1286]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:02:42.720120 systemd-logind[1199]: New session 2 of user core. Dec 13 02:02:42.720993 systemd[1]: Started session-2.scope. Dec 13 02:02:42.774658 sshd[1286]: pam_unix(sshd:session): session closed for user core Dec 13 02:02:42.777318 systemd[1]: Started sshd@2-10.0.0.89:22-10.0.0.1:59786.service. Dec 13 02:02:42.777682 systemd[1]: sshd@1-10.0.0.89:22-10.0.0.1:59784.service: Deactivated successfully. Dec 13 02:02:42.778268 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 02:02:42.778832 systemd-logind[1199]: Session 2 logged out. Waiting for processes to exit. Dec 13 02:02:42.779611 systemd-logind[1199]: Removed session 2. Dec 13 02:02:42.818172 sshd[1291]: Accepted publickey for core from 10.0.0.1 port 59786 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:02:42.819355 sshd[1291]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:02:42.822789 systemd-logind[1199]: New session 3 of user core. Dec 13 02:02:42.823530 systemd[1]: Started session-3.scope. Dec 13 02:02:42.873025 sshd[1291]: pam_unix(sshd:session): session closed for user core Dec 13 02:02:42.876107 systemd[1]: sshd@2-10.0.0.89:22-10.0.0.1:59786.service: Deactivated successfully. Dec 13 02:02:42.876605 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 02:02:42.877145 systemd-logind[1199]: Session 3 logged out. Waiting for processes to exit. Dec 13 02:02:42.878147 systemd[1]: Started sshd@3-10.0.0.89:22-10.0.0.1:59794.service. Dec 13 02:02:42.878973 systemd-logind[1199]: Removed session 3. Dec 13 02:02:42.915992 sshd[1299]: Accepted publickey for core from 10.0.0.1 port 59794 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:02:42.917322 sshd[1299]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:02:42.920309 systemd-logind[1199]: New session 4 of user core. Dec 13 02:02:42.921019 systemd[1]: Started session-4.scope. Dec 13 02:02:42.971755 sshd[1299]: pam_unix(sshd:session): session closed for user core Dec 13 02:02:42.974754 systemd[1]: sshd@3-10.0.0.89:22-10.0.0.1:59794.service: Deactivated successfully. Dec 13 02:02:42.975390 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 02:02:42.975935 systemd-logind[1199]: Session 4 logged out. Waiting for processes to exit. Dec 13 02:02:42.976895 systemd[1]: Started sshd@4-10.0.0.89:22-10.0.0.1:59806.service. Dec 13 02:02:42.977439 systemd-logind[1199]: Removed session 4. Dec 13 02:02:43.013446 sshd[1305]: Accepted publickey for core from 10.0.0.1 port 59806 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:02:43.014340 sshd[1305]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:02:43.017289 systemd-logind[1199]: New session 5 of user core. Dec 13 02:02:43.018090 systemd[1]: Started session-5.scope. Dec 13 02:02:43.071653 sudo[1308]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 02:02:43.071834 sudo[1308]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:02:43.083090 dbus-daemon[1183]: Э: received setenforce notice (enforcing=-1841351632) Dec 13 02:02:43.084841 sudo[1308]: pam_unix(sudo:session): session closed for user root Dec 13 02:02:43.086076 sshd[1305]: pam_unix(sshd:session): session closed for user core Dec 13 02:02:43.088495 systemd[1]: sshd@4-10.0.0.89:22-10.0.0.1:59806.service: Deactivated successfully. Dec 13 02:02:43.089004 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 02:02:43.089466 systemd-logind[1199]: Session 5 logged out. Waiting for processes to exit. Dec 13 02:02:43.090313 systemd[1]: Started sshd@5-10.0.0.89:22-10.0.0.1:59814.service. Dec 13 02:02:43.091122 systemd-logind[1199]: Removed session 5. Dec 13 02:02:43.128066 sshd[1312]: Accepted publickey for core from 10.0.0.1 port 59814 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:02:43.129293 sshd[1312]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:02:43.132543 systemd-logind[1199]: New session 6 of user core. Dec 13 02:02:43.133459 systemd[1]: Started session-6.scope. Dec 13 02:02:43.187913 sudo[1316]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 02:02:43.188159 sudo[1316]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:02:43.190753 sudo[1316]: pam_unix(sudo:session): session closed for user root Dec 13 02:02:43.194874 sudo[1315]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 02:02:43.195078 sudo[1315]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:02:43.202568 systemd[1]: Stopping audit-rules.service... Dec 13 02:02:43.202000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 02:02:43.203846 auditctl[1319]: No rules Dec 13 02:02:43.204860 kernel: kauditd_printk_skb: 236 callbacks suppressed Dec 13 02:02:43.204902 kernel: audit: type=1305 audit(1734055363.202:188): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 02:02:43.205078 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 02:02:43.205245 systemd[1]: Stopped audit-rules.service. Dec 13 02:02:43.206811 systemd[1]: Starting audit-rules.service... Dec 13 02:02:43.202000 audit[1319]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe9f380da0 a2=420 a3=0 items=0 ppid=1 pid=1319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.211518 kernel: audit: type=1300 audit(1734055363.202:188): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe9f380da0 a2=420 a3=0 items=0 ppid=1 pid=1319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.213353 kernel: audit: type=1327 audit(1734055363.202:188): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 02:02:43.202000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 02:02:43.204000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:43.216834 kernel: audit: type=1131 audit(1734055363.204:189): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:43.223416 augenrules[1336]: No rules Dec 13 02:02:43.224066 systemd[1]: Finished audit-rules.service. Dec 13 02:02:43.223000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:43.224873 sudo[1315]: pam_unix(sudo:session): session closed for user root Dec 13 02:02:43.226062 sshd[1312]: pam_unix(sshd:session): session closed for user core Dec 13 02:02:43.224000 audit[1315]: USER_END pid=1315 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:02:43.229230 systemd[1]: sshd@5-10.0.0.89:22-10.0.0.1:59814.service: Deactivated successfully. Dec 13 02:02:43.229809 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 02:02:43.230412 systemd-logind[1199]: Session 6 logged out. Waiting for processes to exit. Dec 13 02:02:43.231435 systemd[1]: Started sshd@6-10.0.0.89:22-10.0.0.1:59816.service. Dec 13 02:02:43.231998 kernel: audit: type=1130 audit(1734055363.223:190): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:43.232068 kernel: audit: type=1106 audit(1734055363.224:191): pid=1315 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:02:43.232094 kernel: audit: type=1104 audit(1734055363.224:192): pid=1315 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:02:43.224000 audit[1315]: CRED_DISP pid=1315 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:02:43.232603 systemd-logind[1199]: Removed session 6. Dec 13 02:02:43.235432 kernel: audit: type=1106 audit(1734055363.226:193): pid=1312 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:43.226000 audit[1312]: USER_END pid=1312 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:43.226000 audit[1312]: CRED_DISP pid=1312 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:43.243261 kernel: audit: type=1104 audit(1734055363.226:194): pid=1312 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:43.243353 kernel: audit: type=1131 audit(1734055363.228:195): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.89:22-10.0.0.1:59814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:43.228000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.89:22-10.0.0.1:59814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:43.230000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.89:22-10.0.0.1:59816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:43.268000 audit[1342]: USER_ACCT pid=1342 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:43.269549 sshd[1342]: Accepted publickey for core from 10.0.0.1 port 59816 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:02:43.269000 audit[1342]: CRED_ACQ pid=1342 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:43.269000 audit[1342]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffabe350a0 a2=3 a3=0 items=0 ppid=1 pid=1342 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.269000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:02:43.270268 sshd[1342]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:02:43.273486 systemd-logind[1199]: New session 7 of user core. Dec 13 02:02:43.274364 systemd[1]: Started session-7.scope. Dec 13 02:02:43.276000 audit[1342]: USER_START pid=1342 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:43.277000 audit[1344]: CRED_ACQ pid=1344 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:43.325000 audit[1345]: USER_ACCT pid=1345 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:02:43.325000 audit[1345]: CRED_REFR pid=1345 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:02:43.326127 sudo[1345]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 02:02:43.326327 sudo[1345]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:02:43.327000 audit[1345]: USER_START pid=1345 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:02:43.344912 systemd[1]: Starting docker.service... Dec 13 02:02:43.377365 env[1357]: time="2024-12-13T02:02:43.377305902Z" level=info msg="Starting up" Dec 13 02:02:43.378700 env[1357]: time="2024-12-13T02:02:43.378648360Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 02:02:43.378700 env[1357]: time="2024-12-13T02:02:43.378688906Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 02:02:43.378778 env[1357]: time="2024-12-13T02:02:43.378710366Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 02:02:43.378778 env[1357]: time="2024-12-13T02:02:43.378721507Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 02:02:43.380171 env[1357]: time="2024-12-13T02:02:43.380140678Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 02:02:43.380171 env[1357]: time="2024-12-13T02:02:43.380160175Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 02:02:43.380171 env[1357]: time="2024-12-13T02:02:43.380177838Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 02:02:43.380378 env[1357]: time="2024-12-13T02:02:43.380187847Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 02:02:43.799926 env[1357]: time="2024-12-13T02:02:43.799874850Z" level=info msg="Loading containers: start." Dec 13 02:02:43.851000 audit[1390]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1390 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:02:43.851000 audit[1390]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffc5df97a60 a2=0 a3=7ffc5df97a4c items=0 ppid=1357 pid=1390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.851000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Dec 13 02:02:43.853000 audit[1392]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1392 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:02:43.853000 audit[1392]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffc7fd1b2c0 a2=0 a3=7ffc7fd1b2ac items=0 ppid=1357 pid=1392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.853000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Dec 13 02:02:43.855000 audit[1394]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1394 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:02:43.855000 audit[1394]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd7fb51b10 a2=0 a3=7ffd7fb51afc items=0 ppid=1357 pid=1394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.855000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 02:02:43.856000 audit[1396]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1396 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:02:43.856000 audit[1396]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe68ef5750 a2=0 a3=7ffe68ef573c items=0 ppid=1357 pid=1396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.856000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 02:02:43.858000 audit[1398]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1398 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:02:43.858000 audit[1398]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd8615adb0 a2=0 a3=7ffd8615ad9c items=0 ppid=1357 pid=1398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.858000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Dec 13 02:02:43.876000 audit[1403]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1403 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:02:43.876000 audit[1403]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd58995f80 a2=0 a3=7ffd58995f6c items=0 ppid=1357 pid=1403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.876000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Dec 13 02:02:43.884000 audit[1405]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1405 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:02:43.884000 audit[1405]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffca184e980 a2=0 a3=7ffca184e96c items=0 ppid=1357 pid=1405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.884000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Dec 13 02:02:43.886000 audit[1407]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1407 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:02:43.886000 audit[1407]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffe417e11a0 a2=0 a3=7ffe417e118c items=0 ppid=1357 pid=1407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.886000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Dec 13 02:02:43.887000 audit[1409]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1409 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:02:43.887000 audit[1409]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffda39b33e0 a2=0 a3=7ffda39b33cc items=0 ppid=1357 pid=1409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.887000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 02:02:43.895000 audit[1413]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1413 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:02:43.895000 audit[1413]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffe9681fe00 a2=0 a3=7ffe9681fdec items=0 ppid=1357 pid=1413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.895000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 02:02:43.900000 audit[1414]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1414 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:02:43.900000 audit[1414]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffcd2c000c0 a2=0 a3=7ffcd2c000ac items=0 ppid=1357 pid=1414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.900000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 02:02:43.909905 kernel: Initializing XFRM netlink socket Dec 13 02:02:43.935112 env[1357]: time="2024-12-13T02:02:43.935077954Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Dec 13 02:02:43.949000 audit[1422]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1422 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:02:43.949000 audit[1422]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fff0747d200 a2=0 a3=7fff0747d1ec items=0 ppid=1357 pid=1422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.949000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Dec 13 02:02:43.959000 audit[1425]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1425 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:02:43.959000 audit[1425]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7fff0405a1f0 a2=0 a3=7fff0405a1dc items=0 ppid=1357 pid=1425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.959000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Dec 13 02:02:43.961000 audit[1428]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1428 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:02:43.961000 audit[1428]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffce7efa950 a2=0 a3=7ffce7efa93c items=0 ppid=1357 pid=1428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.961000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Dec 13 02:02:43.962000 audit[1430]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1430 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:02:43.962000 audit[1430]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff937349c0 a2=0 a3=7fff937349ac items=0 ppid=1357 pid=1430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.962000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Dec 13 02:02:43.964000 audit[1432]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1432 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:02:43.964000 audit[1432]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffe60d12510 a2=0 a3=7ffe60d124fc items=0 ppid=1357 pid=1432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.964000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Dec 13 02:02:43.966000 audit[1434]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1434 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:02:43.966000 audit[1434]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffdaa134f20 a2=0 a3=7ffdaa134f0c items=0 ppid=1357 pid=1434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.966000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Dec 13 02:02:43.967000 audit[1436]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1436 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:02:43.967000 audit[1436]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffcad4ee770 a2=0 a3=7ffcad4ee75c items=0 ppid=1357 pid=1436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.967000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Dec 13 02:02:43.973000 audit[1439]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1439 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:02:43.973000 audit[1439]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7fff7f67e400 a2=0 a3=7fff7f67e3ec items=0 ppid=1357 pid=1439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.973000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Dec 13 02:02:43.974000 audit[1441]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1441 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:02:43.974000 audit[1441]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fff9e812600 a2=0 a3=7fff9e8125ec items=0 ppid=1357 pid=1441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.974000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 02:02:43.976000 audit[1443]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1443 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:02:43.976000 audit[1443]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffd3ec66e40 a2=0 a3=7ffd3ec66e2c items=0 ppid=1357 pid=1443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.976000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 02:02:43.978000 audit[1445]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1445 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:02:43.978000 audit[1445]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffca38d1240 a2=0 a3=7ffca38d122c items=0 ppid=1357 pid=1445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.978000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Dec 13 02:02:43.979388 systemd-networkd[1031]: docker0: Link UP Dec 13 02:02:43.990000 audit[1449]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1449 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:02:43.990000 audit[1449]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdbdeff8f0 a2=0 a3=7ffdbdeff8dc items=0 ppid=1357 pid=1449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.990000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 02:02:43.994000 audit[1450]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1450 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:02:43.994000 audit[1450]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe9c8ee390 a2=0 a3=7ffe9c8ee37c items=0 ppid=1357 pid=1450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.994000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 02:02:43.995835 env[1357]: time="2024-12-13T02:02:43.995801502Z" level=info msg="Loading containers: done." Dec 13 02:02:44.003797 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck4286659407-merged.mount: Deactivated successfully. Dec 13 02:02:44.010586 env[1357]: time="2024-12-13T02:02:44.010544581Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Dec 13 02:02:44.010734 env[1357]: time="2024-12-13T02:02:44.010708718Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Dec 13 02:02:44.010806 env[1357]: time="2024-12-13T02:02:44.010790341Z" level=info msg="Daemon has completed initialization" Dec 13 02:02:44.027523 systemd[1]: Started docker.service. Dec 13 02:02:44.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:44.033586 env[1357]: time="2024-12-13T02:02:44.033525097Z" level=info msg="API listen on /run/docker.sock" Dec 13 02:02:44.666620 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 02:02:44.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:44.666000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:44.666801 systemd[1]: Stopped kubelet.service. Dec 13 02:02:44.668044 systemd[1]: Starting kubelet.service... Dec 13 02:02:44.733369 env[1212]: time="2024-12-13T02:02:44.733312508Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.8\"" Dec 13 02:02:44.758622 systemd[1]: Started kubelet.service. Dec 13 02:02:44.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:45.133572 kubelet[1496]: E1213 02:02:45.133458 1496 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 02:02:45.136302 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 02:02:45.136412 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 02:02:45.135000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 02:02:45.753740 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1165781912.mount: Deactivated successfully. Dec 13 02:02:47.740876 env[1212]: time="2024-12-13T02:02:47.740804239Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:47.742665 env[1212]: time="2024-12-13T02:02:47.742611809Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:772392d372035bf92e430e758ad0446146d82b7192358c8651252e4fb49c43dd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:47.744774 env[1212]: time="2024-12-13T02:02:47.744738587Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:47.748142 env[1212]: time="2024-12-13T02:02:47.748092236Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:f0e1b3de0c2e98e6c6abd73edf9d3b8e4d44460656cde0ebb92e2d9206961fcb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:47.748735 env[1212]: time="2024-12-13T02:02:47.748693905Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.8\" returns image reference \"sha256:772392d372035bf92e430e758ad0446146d82b7192358c8651252e4fb49c43dd\"" Dec 13 02:02:47.756984 env[1212]: time="2024-12-13T02:02:47.756945910Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.8\"" Dec 13 02:02:50.502332 env[1212]: time="2024-12-13T02:02:50.502266777Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:50.504425 env[1212]: time="2024-12-13T02:02:50.504375201Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:85333d41dd3ce32d8344280c6d533d4c8f66252e4c28e332a2322ba3837f7bd6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:50.506181 env[1212]: time="2024-12-13T02:02:50.506146302Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:50.507759 env[1212]: time="2024-12-13T02:02:50.507725203Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:124f66b7e877eb5a80a40503057299bb60e6a5f2130905f4e3293dabf194c397,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:50.508471 env[1212]: time="2024-12-13T02:02:50.508433542Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.8\" returns image reference \"sha256:85333d41dd3ce32d8344280c6d533d4c8f66252e4c28e332a2322ba3837f7bd6\"" Dec 13 02:02:50.516898 env[1212]: time="2024-12-13T02:02:50.516854113Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.8\"" Dec 13 02:02:52.055083 env[1212]: time="2024-12-13T02:02:52.055031104Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:52.056897 env[1212]: time="2024-12-13T02:02:52.056858491Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:eb53b988d5e03f329b5fdba21cbbbae48e1619b199689e7448095b31843b2c43,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:52.058613 env[1212]: time="2024-12-13T02:02:52.058580360Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:52.060132 env[1212]: time="2024-12-13T02:02:52.060105250Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:c8bdeac2590c99c1a77e33995423ddb6633ff90a82a2aa455442e0a8079ef8c7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:52.060812 env[1212]: time="2024-12-13T02:02:52.060775647Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.8\" returns image reference \"sha256:eb53b988d5e03f329b5fdba21cbbbae48e1619b199689e7448095b31843b2c43\"" Dec 13 02:02:52.069026 env[1212]: time="2024-12-13T02:02:52.068993459Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\"" Dec 13 02:02:54.250461 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount598450829.mount: Deactivated successfully. Dec 13 02:02:55.089025 env[1212]: time="2024-12-13T02:02:55.088965444Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:55.091046 env[1212]: time="2024-12-13T02:02:55.091011601Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ce61fda67eb41cf09d2b984e7979e289b5042e3983ddfc67be678425632cc0d2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:55.092417 env[1212]: time="2024-12-13T02:02:55.092373495Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:55.093639 env[1212]: time="2024-12-13T02:02:55.093609974Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6d6be9417e22af78905000ac4fd134896bacd2188ea63c7cac8edd7a5d7e9b5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:55.094007 env[1212]: time="2024-12-13T02:02:55.093972654Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\" returns image reference \"sha256:ce61fda67eb41cf09d2b984e7979e289b5042e3983ddfc67be678425632cc0d2\"" Dec 13 02:02:55.102828 env[1212]: time="2024-12-13T02:02:55.102800630Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Dec 13 02:02:55.166581 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 02:02:55.166755 systemd[1]: Stopped kubelet.service. Dec 13 02:02:55.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:55.167714 kernel: kauditd_printk_skb: 88 callbacks suppressed Dec 13 02:02:55.167775 kernel: audit: type=1130 audit(1734055375.166:234): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:55.167944 systemd[1]: Starting kubelet.service... Dec 13 02:02:55.166000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:55.174436 kernel: audit: type=1131 audit(1734055375.166:235): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:55.242639 systemd[1]: Started kubelet.service. Dec 13 02:02:55.241000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:55.246904 kernel: audit: type=1130 audit(1734055375.241:236): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:55.425000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 02:02:55.429608 kubelet[1538]: E1213 02:02:55.424214 1538 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 02:02:55.425704 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 02:02:55.429966 kernel: audit: type=1131 audit(1734055375.425:237): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 02:02:55.425808 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 02:02:55.917825 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2566357061.mount: Deactivated successfully. Dec 13 02:02:57.142943 env[1212]: time="2024-12-13T02:02:57.142867484Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:57.145746 env[1212]: time="2024-12-13T02:02:57.145686530Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:57.147780 env[1212]: time="2024-12-13T02:02:57.147748377Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:57.150048 env[1212]: time="2024-12-13T02:02:57.150016611Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:57.150658 env[1212]: time="2024-12-13T02:02:57.150627176Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Dec 13 02:02:57.161219 env[1212]: time="2024-12-13T02:02:57.161172933Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Dec 13 02:02:57.682869 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4047361775.mount: Deactivated successfully. Dec 13 02:02:57.688484 env[1212]: time="2024-12-13T02:02:57.688438093Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:57.690467 env[1212]: time="2024-12-13T02:02:57.690434587Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:57.691897 env[1212]: time="2024-12-13T02:02:57.691864479Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:57.693341 env[1212]: time="2024-12-13T02:02:57.693319137Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:57.693745 env[1212]: time="2024-12-13T02:02:57.693712134Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Dec 13 02:02:57.701808 env[1212]: time="2024-12-13T02:02:57.701772700Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\"" Dec 13 02:02:58.301521 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1512005689.mount: Deactivated successfully. Dec 13 02:03:01.784170 env[1212]: time="2024-12-13T02:03:01.784113597Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:01.786230 env[1212]: time="2024-12-13T02:03:01.786197184Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:01.787939 env[1212]: time="2024-12-13T02:03:01.787914585Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:01.789568 env[1212]: time="2024-12-13T02:03:01.789540414Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:44a8e24dcbba3470ee1fee21d5e88d128c936e9b55d4bc51fbef8086f8ed123b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:01.790250 env[1212]: time="2024-12-13T02:03:01.790201634Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\" returns image reference \"sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899\"" Dec 13 02:03:04.193945 systemd[1]: Stopped kubelet.service. Dec 13 02:03:04.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:04.195800 systemd[1]: Starting kubelet.service... Dec 13 02:03:04.193000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:04.201846 kernel: audit: type=1130 audit(1734055384.193:238): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:04.201960 kernel: audit: type=1131 audit(1734055384.193:239): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:04.213417 systemd[1]: Reloading. Dec 13 02:03:04.313560 /usr/lib/systemd/system-generators/torcx-generator[1662]: time="2024-12-13T02:03:04Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:03:04.313997 /usr/lib/systemd/system-generators/torcx-generator[1662]: time="2024-12-13T02:03:04Z" level=info msg="torcx already run" Dec 13 02:03:04.666180 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:03:04.666188 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:03:04.682487 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:03:04.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.746431 kernel: audit: type=1400 audit(1734055384.739:240): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.746490 kernel: audit: type=1400 audit(1734055384.739:241): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.746530 kernel: audit: type=1400 audit(1734055384.739:242): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.752729 kernel: audit: type=1400 audit(1734055384.739:243): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.752771 kernel: audit: type=1400 audit(1734055384.739:244): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.759920 kernel: audit: type=1400 audit(1734055384.739:245): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.759973 kernel: audit: type=1400 audit(1734055384.739:246): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.767243 kernel: audit: type=1400 audit(1734055384.739:247): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.745000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.745000 audit: BPF prog-id=43 op=LOAD Dec 13 02:03:04.745000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.745000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.745000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.745000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.745000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.745000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.745000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.745000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.751000 audit: BPF prog-id=44 op=LOAD Dec 13 02:03:04.751000 audit: BPF prog-id=27 op=UNLOAD Dec 13 02:03:04.751000 audit: BPF prog-id=28 op=UNLOAD Dec 13 02:03:04.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.755000 audit: BPF prog-id=45 op=LOAD Dec 13 02:03:04.755000 audit: BPF prog-id=38 op=UNLOAD Dec 13 02:03:04.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.762000 audit: BPF prog-id=46 op=LOAD Dec 13 02:03:04.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.766000 audit: BPF prog-id=47 op=LOAD Dec 13 02:03:04.766000 audit: BPF prog-id=39 op=UNLOAD Dec 13 02:03:04.766000 audit: BPF prog-id=40 op=UNLOAD Dec 13 02:03:04.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.767000 audit: BPF prog-id=48 op=LOAD Dec 13 02:03:04.767000 audit: BPF prog-id=36 op=UNLOAD Dec 13 02:03:04.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.768000 audit: BPF prog-id=49 op=LOAD Dec 13 02:03:04.768000 audit: BPF prog-id=41 op=UNLOAD Dec 13 02:03:04.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.769000 audit: BPF prog-id=50 op=LOAD Dec 13 02:03:04.769000 audit: BPF prog-id=29 op=UNLOAD Dec 13 02:03:04.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.770000 audit: BPF prog-id=51 op=LOAD Dec 13 02:03:04.770000 audit: BPF prog-id=30 op=UNLOAD Dec 13 02:03:04.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.771000 audit: BPF prog-id=52 op=LOAD Dec 13 02:03:04.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.771000 audit: BPF prog-id=53 op=LOAD Dec 13 02:03:04.771000 audit: BPF prog-id=31 op=UNLOAD Dec 13 02:03:04.771000 audit: BPF prog-id=32 op=UNLOAD Dec 13 02:03:04.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.772000 audit: BPF prog-id=54 op=LOAD Dec 13 02:03:04.772000 audit: BPF prog-id=33 op=UNLOAD Dec 13 02:03:04.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.772000 audit: BPF prog-id=55 op=LOAD Dec 13 02:03:04.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.772000 audit: BPF prog-id=56 op=LOAD Dec 13 02:03:04.772000 audit: BPF prog-id=34 op=UNLOAD Dec 13 02:03:04.772000 audit: BPF prog-id=35 op=UNLOAD Dec 13 02:03:04.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:04.773000 audit: BPF prog-id=57 op=LOAD Dec 13 02:03:04.774000 audit: BPF prog-id=37 op=UNLOAD Dec 13 02:03:04.783658 systemd[1]: Started kubelet.service. Dec 13 02:03:04.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:04.787447 systemd[1]: Stopping kubelet.service... Dec 13 02:03:04.790608 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 02:03:04.790754 systemd[1]: Stopped kubelet.service. Dec 13 02:03:04.789000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:04.792275 systemd[1]: Starting kubelet.service... Dec 13 02:03:04.872584 systemd[1]: Started kubelet.service. Dec 13 02:03:04.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:04.915598 kubelet[1712]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 02:03:04.915598 kubelet[1712]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 02:03:04.915598 kubelet[1712]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 02:03:04.915978 kubelet[1712]: I1213 02:03:04.915638 1712 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 02:03:05.222476 kubelet[1712]: I1213 02:03:05.222415 1712 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Dec 13 02:03:05.222476 kubelet[1712]: I1213 02:03:05.222452 1712 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 02:03:05.222721 kubelet[1712]: I1213 02:03:05.222695 1712 server.go:927] "Client rotation is on, will bootstrap in background" Dec 13 02:03:05.234587 kubelet[1712]: I1213 02:03:05.234527 1712 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 02:03:05.236283 kubelet[1712]: E1213 02:03:05.235064 1712 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.0.0.89:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.0.0.89:6443: connect: connection refused Dec 13 02:03:05.245274 kubelet[1712]: I1213 02:03:05.245217 1712 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 02:03:05.246842 kubelet[1712]: I1213 02:03:05.246796 1712 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 02:03:05.247013 kubelet[1712]: I1213 02:03:05.246831 1712 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 02:03:05.247150 kubelet[1712]: I1213 02:03:05.247019 1712 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 02:03:05.247150 kubelet[1712]: I1213 02:03:05.247029 1712 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 02:03:05.247150 kubelet[1712]: I1213 02:03:05.247142 1712 state_mem.go:36] "Initialized new in-memory state store" Dec 13 02:03:05.247726 kubelet[1712]: I1213 02:03:05.247705 1712 kubelet.go:400] "Attempting to sync node with API server" Dec 13 02:03:05.247726 kubelet[1712]: I1213 02:03:05.247722 1712 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 02:03:05.247779 kubelet[1712]: I1213 02:03:05.247739 1712 kubelet.go:312] "Adding apiserver pod source" Dec 13 02:03:05.247779 kubelet[1712]: I1213 02:03:05.247754 1712 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 02:03:05.258277 kubelet[1712]: W1213 02:03:05.258190 1712 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.89:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.89:6443: connect: connection refused Dec 13 02:03:05.258277 kubelet[1712]: E1213 02:03:05.258279 1712 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.89:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.89:6443: connect: connection refused Dec 13 02:03:05.260047 kubelet[1712]: W1213 02:03:05.259981 1712 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.89:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.89:6443: connect: connection refused Dec 13 02:03:05.260129 kubelet[1712]: E1213 02:03:05.260054 1712 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.89:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.89:6443: connect: connection refused Dec 13 02:03:05.260676 kubelet[1712]: I1213 02:03:05.260652 1712 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 02:03:05.265330 kubelet[1712]: I1213 02:03:05.265288 1712 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 02:03:05.265395 kubelet[1712]: W1213 02:03:05.265377 1712 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 02:03:05.266224 kubelet[1712]: I1213 02:03:05.266195 1712 server.go:1264] "Started kubelet" Dec 13 02:03:05.267874 kubelet[1712]: I1213 02:03:05.267816 1712 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 02:03:05.268206 kubelet[1712]: I1213 02:03:05.268184 1712 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 02:03:05.273743 kubelet[1712]: I1213 02:03:05.273692 1712 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 02:03:05.273000 audit[1712]: AVC avc: denied { mac_admin } for pid=1712 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:05.273000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:03:05.273000 audit[1712]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b49590 a1=c000505b18 a2=c000b49560 a3=25 items=0 ppid=1 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:05.273000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:03:05.273000 audit[1712]: AVC avc: denied { mac_admin } for pid=1712 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:05.273000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:03:05.273000 audit[1712]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00089d460 a1=c000505b30 a2=c000b49620 a3=25 items=0 ppid=1 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:05.273000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:03:05.275060 kubelet[1712]: I1213 02:03:05.274736 1712 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 02:03:05.275060 kubelet[1712]: I1213 02:03:05.274769 1712 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 02:03:05.275060 kubelet[1712]: I1213 02:03:05.274821 1712 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 02:03:05.275414 kubelet[1712]: I1213 02:03:05.275373 1712 server.go:455] "Adding debug handlers to kubelet server" Dec 13 02:03:05.276000 audit[1724]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1724 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:05.276000 audit[1724]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff5f2c5350 a2=0 a3=7fff5f2c533c items=0 ppid=1712 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:05.276000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 02:03:05.281000 audit[1725]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1725 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:05.281000 audit[1725]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdcaed2340 a2=0 a3=7ffdcaed232c items=0 ppid=1712 pid=1725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:05.281000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 02:03:05.282524 kubelet[1712]: I1213 02:03:05.282494 1712 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 02:03:05.282665 kubelet[1712]: I1213 02:03:05.282639 1712 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Dec 13 02:03:05.282749 kubelet[1712]: I1213 02:03:05.282724 1712 reconciler.go:26] "Reconciler: start to sync state" Dec 13 02:03:05.283251 kubelet[1712]: W1213 02:03:05.283189 1712 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.89:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.89:6443: connect: connection refused Dec 13 02:03:05.283306 kubelet[1712]: E1213 02:03:05.283266 1712 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.89:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.89:6443: connect: connection refused Dec 13 02:03:05.283545 kubelet[1712]: E1213 02:03:05.283185 1712 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.89:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.89:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.18109a2f7ba47a7b default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2024-12-13 02:03:05.266158203 +0000 UTC m=+0.389336876,LastTimestamp:2024-12-13 02:03:05.266158203 +0000 UTC m=+0.389336876,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" Dec 13 02:03:05.283667 kubelet[1712]: E1213 02:03:05.283567 1712 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.89:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.89:6443: connect: connection refused" interval="200ms" Dec 13 02:03:05.283825 kubelet[1712]: I1213 02:03:05.283803 1712 factory.go:221] Registration of the systemd container factory successfully Dec 13 02:03:05.283869 kubelet[1712]: I1213 02:03:05.283861 1712 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 02:03:05.284213 kubelet[1712]: E1213 02:03:05.284197 1712 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 02:03:05.283000 audit[1728]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1728 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:05.283000 audit[1728]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff152bb500 a2=0 a3=7fff152bb4ec items=0 ppid=1712 pid=1728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:05.283000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:03:05.284869 kubelet[1712]: I1213 02:03:05.284854 1712 factory.go:221] Registration of the containerd container factory successfully Dec 13 02:03:05.287000 audit[1731]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1731 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:05.287000 audit[1731]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe54677ef0 a2=0 a3=7ffe54677edc items=0 ppid=1712 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:05.287000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:03:05.293828 kubelet[1712]: I1213 02:03:05.293800 1712 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 02:03:05.293828 kubelet[1712]: I1213 02:03:05.293819 1712 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 02:03:05.293828 kubelet[1712]: I1213 02:03:05.293831 1712 state_mem.go:36] "Initialized new in-memory state store" Dec 13 02:03:05.296000 audit[1736]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1736 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:05.296000 audit[1736]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff2f919ab0 a2=0 a3=7fff2f919a9c items=0 ppid=1712 pid=1736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:05.296000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 02:03:05.297298 kubelet[1712]: I1213 02:03:05.297253 1712 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 02:03:05.297000 audit[1739]: NETFILTER_CFG table=mangle:31 family=2 entries=1 op=nft_register_chain pid=1739 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:05.297000 audit[1739]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffccf7fb910 a2=0 a3=7ffccf7fb8fc items=0 ppid=1712 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:05.297000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 02:03:05.297000 audit[1738]: NETFILTER_CFG table=mangle:32 family=10 entries=2 op=nft_register_chain pid=1738 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:05.297000 audit[1738]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe56f7f640 a2=0 a3=7ffe56f7f62c items=0 ppid=1712 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:05.297000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 02:03:05.298740 kubelet[1712]: I1213 02:03:05.298726 1712 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 02:03:05.298770 kubelet[1712]: I1213 02:03:05.298755 1712 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 02:03:05.298791 kubelet[1712]: I1213 02:03:05.298771 1712 kubelet.go:2337] "Starting kubelet main sync loop" Dec 13 02:03:05.298833 kubelet[1712]: E1213 02:03:05.298819 1712 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 02:03:05.298000 audit[1740]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1740 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:05.298000 audit[1740]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffe15ff660 a2=0 a3=7fffe15ff64c items=0 ppid=1712 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:05.298000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 02:03:05.299481 kubelet[1712]: W1213 02:03:05.299250 1712 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.89:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.89:6443: connect: connection refused Dec 13 02:03:05.299481 kubelet[1712]: E1213 02:03:05.299274 1712 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.89:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.89:6443: connect: connection refused Dec 13 02:03:05.298000 audit[1741]: NETFILTER_CFG table=mangle:34 family=10 entries=1 op=nft_register_chain pid=1741 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:05.298000 audit[1741]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff1a847380 a2=0 a3=7fff1a84736c items=0 ppid=1712 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:05.298000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 02:03:05.299000 audit[1742]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=1742 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:05.299000 audit[1742]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc3a510090 a2=0 a3=7ffc3a51007c items=0 ppid=1712 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:05.299000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 02:03:05.299000 audit[1743]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1743 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:05.299000 audit[1743]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff0c8d8800 a2=0 a3=7fff0c8d87ec items=0 ppid=1712 pid=1743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:05.299000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 02:03:05.300000 audit[1744]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1744 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:05.300000 audit[1744]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd707d39f0 a2=0 a3=7ffd707d39dc items=0 ppid=1712 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:05.300000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 02:03:05.383750 kubelet[1712]: I1213 02:03:05.383723 1712 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 02:03:05.384093 kubelet[1712]: E1213 02:03:05.384052 1712 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.89:6443/api/v1/nodes\": dial tcp 10.0.0.89:6443: connect: connection refused" node="localhost" Dec 13 02:03:05.399409 kubelet[1712]: E1213 02:03:05.399353 1712 kubelet.go:2361] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Dec 13 02:03:05.485294 kubelet[1712]: E1213 02:03:05.485171 1712 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.89:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.89:6443: connect: connection refused" interval="400ms" Dec 13 02:03:05.585508 kubelet[1712]: I1213 02:03:05.585476 1712 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 02:03:05.585920 kubelet[1712]: E1213 02:03:05.585858 1712 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.89:6443/api/v1/nodes\": dial tcp 10.0.0.89:6443: connect: connection refused" node="localhost" Dec 13 02:03:05.599946 kubelet[1712]: E1213 02:03:05.599915 1712 kubelet.go:2361] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Dec 13 02:03:05.688428 kubelet[1712]: I1213 02:03:05.688387 1712 policy_none.go:49] "None policy: Start" Dec 13 02:03:05.689238 kubelet[1712]: I1213 02:03:05.689211 1712 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 02:03:05.689282 kubelet[1712]: I1213 02:03:05.689248 1712 state_mem.go:35] "Initializing new in-memory state store" Dec 13 02:03:05.701838 systemd[1]: Created slice kubepods.slice. Dec 13 02:03:05.710075 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 02:03:05.713191 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 02:03:05.725601 kubelet[1712]: I1213 02:03:05.725570 1712 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 02:03:05.724000 audit[1712]: AVC avc: denied { mac_admin } for pid=1712 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:05.724000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:03:05.724000 audit[1712]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b30fc0 a1=c001006810 a2=c000b30f90 a3=25 items=0 ppid=1 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:05.724000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:03:05.725957 kubelet[1712]: I1213 02:03:05.725639 1712 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 02:03:05.725957 kubelet[1712]: I1213 02:03:05.725759 1712 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 02:03:05.725957 kubelet[1712]: I1213 02:03:05.725858 1712 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 02:03:05.726733 kubelet[1712]: E1213 02:03:05.726697 1712 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" Dec 13 02:03:05.886140 kubelet[1712]: E1213 02:03:05.885999 1712 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.89:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.89:6443: connect: connection refused" interval="800ms" Dec 13 02:03:05.987402 kubelet[1712]: I1213 02:03:05.987354 1712 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 02:03:05.987727 kubelet[1712]: E1213 02:03:05.987649 1712 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.89:6443/api/v1/nodes\": dial tcp 10.0.0.89:6443: connect: connection refused" node="localhost" Dec 13 02:03:06.000781 kubelet[1712]: I1213 02:03:06.000731 1712 topology_manager.go:215] "Topology Admit Handler" podUID="4bff9088ddb27ae6c87cab3714f15485" podNamespace="kube-system" podName="kube-apiserver-localhost" Dec 13 02:03:06.001685 kubelet[1712]: I1213 02:03:06.001643 1712 topology_manager.go:215] "Topology Admit Handler" podUID="8a50003978138b3ab9890682eff4eae8" podNamespace="kube-system" podName="kube-controller-manager-localhost" Dec 13 02:03:06.002391 kubelet[1712]: I1213 02:03:06.002359 1712 topology_manager.go:215] "Topology Admit Handler" podUID="b107a98bcf27297d642d248711a3fc70" podNamespace="kube-system" podName="kube-scheduler-localhost" Dec 13 02:03:06.007795 systemd[1]: Created slice kubepods-burstable-pod4bff9088ddb27ae6c87cab3714f15485.slice. Dec 13 02:03:06.019256 systemd[1]: Created slice kubepods-burstable-pod8a50003978138b3ab9890682eff4eae8.slice. Dec 13 02:03:06.021900 systemd[1]: Created slice kubepods-burstable-podb107a98bcf27297d642d248711a3fc70.slice. Dec 13 02:03:06.087596 kubelet[1712]: I1213 02:03:06.087538 1712 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/4bff9088ddb27ae6c87cab3714f15485-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"4bff9088ddb27ae6c87cab3714f15485\") " pod="kube-system/kube-apiserver-localhost" Dec 13 02:03:06.087596 kubelet[1712]: I1213 02:03:06.087585 1712 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/8a50003978138b3ab9890682eff4eae8-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"8a50003978138b3ab9890682eff4eae8\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 02:03:06.087787 kubelet[1712]: I1213 02:03:06.087616 1712 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/8a50003978138b3ab9890682eff4eae8-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"8a50003978138b3ab9890682eff4eae8\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 02:03:06.087787 kubelet[1712]: I1213 02:03:06.087641 1712 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/8a50003978138b3ab9890682eff4eae8-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"8a50003978138b3ab9890682eff4eae8\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 02:03:06.087787 kubelet[1712]: I1213 02:03:06.087672 1712 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/8a50003978138b3ab9890682eff4eae8-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"8a50003978138b3ab9890682eff4eae8\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 02:03:06.087787 kubelet[1712]: I1213 02:03:06.087693 1712 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/8a50003978138b3ab9890682eff4eae8-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"8a50003978138b3ab9890682eff4eae8\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 02:03:06.087787 kubelet[1712]: I1213 02:03:06.087721 1712 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b107a98bcf27297d642d248711a3fc70-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"b107a98bcf27297d642d248711a3fc70\") " pod="kube-system/kube-scheduler-localhost" Dec 13 02:03:06.087903 kubelet[1712]: I1213 02:03:06.087737 1712 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/4bff9088ddb27ae6c87cab3714f15485-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"4bff9088ddb27ae6c87cab3714f15485\") " pod="kube-system/kube-apiserver-localhost" Dec 13 02:03:06.087903 kubelet[1712]: I1213 02:03:06.087781 1712 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/4bff9088ddb27ae6c87cab3714f15485-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"4bff9088ddb27ae6c87cab3714f15485\") " pod="kube-system/kube-apiserver-localhost" Dec 13 02:03:06.191460 kubelet[1712]: E1213 02:03:06.191347 1712 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.89:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.89:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.18109a2f7ba47a7b default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2024-12-13 02:03:05.266158203 +0000 UTC m=+0.389336876,LastTimestamp:2024-12-13 02:03:05.266158203 +0000 UTC m=+0.389336876,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" Dec 13 02:03:06.293820 kubelet[1712]: W1213 02:03:06.293749 1712 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.89:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.89:6443: connect: connection refused Dec 13 02:03:06.293820 kubelet[1712]: E1213 02:03:06.293809 1712 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.89:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.89:6443: connect: connection refused Dec 13 02:03:06.312611 kubelet[1712]: W1213 02:03:06.312525 1712 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.89:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.89:6443: connect: connection refused Dec 13 02:03:06.312611 kubelet[1712]: E1213 02:03:06.312606 1712 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.89:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.89:6443: connect: connection refused Dec 13 02:03:06.318745 kubelet[1712]: E1213 02:03:06.318711 1712 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:06.319525 env[1212]: time="2024-12-13T02:03:06.319474244Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:4bff9088ddb27ae6c87cab3714f15485,Namespace:kube-system,Attempt:0,}" Dec 13 02:03:06.321660 kubelet[1712]: E1213 02:03:06.321630 1712 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:06.322190 env[1212]: time="2024-12-13T02:03:06.322147583Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:8a50003978138b3ab9890682eff4eae8,Namespace:kube-system,Attempt:0,}" Dec 13 02:03:06.324366 kubelet[1712]: E1213 02:03:06.324326 1712 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:06.324712 env[1212]: time="2024-12-13T02:03:06.324672626Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:b107a98bcf27297d642d248711a3fc70,Namespace:kube-system,Attempt:0,}" Dec 13 02:03:06.440814 kubelet[1712]: W1213 02:03:06.440728 1712 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.89:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.89:6443: connect: connection refused Dec 13 02:03:06.440814 kubelet[1712]: E1213 02:03:06.440804 1712 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.89:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.89:6443: connect: connection refused Dec 13 02:03:06.687368 kubelet[1712]: E1213 02:03:06.687299 1712 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.89:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.89:6443: connect: connection refused" interval="1.6s" Dec 13 02:03:06.789339 kubelet[1712]: I1213 02:03:06.789306 1712 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 02:03:06.789668 kubelet[1712]: E1213 02:03:06.789632 1712 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.89:6443/api/v1/nodes\": dial tcp 10.0.0.89:6443: connect: connection refused" node="localhost" Dec 13 02:03:06.814351 kubelet[1712]: W1213 02:03:06.814284 1712 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.89:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.89:6443: connect: connection refused Dec 13 02:03:06.814430 kubelet[1712]: E1213 02:03:06.814358 1712 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.89:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.89:6443: connect: connection refused Dec 13 02:03:07.368668 kubelet[1712]: E1213 02:03:07.368631 1712 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.0.0.89:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.0.0.89:6443: connect: connection refused Dec 13 02:03:08.043819 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2174959272.mount: Deactivated successfully. Dec 13 02:03:08.065215 kubelet[1712]: W1213 02:03:08.065186 1712 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.89:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.89:6443: connect: connection refused Dec 13 02:03:08.065279 kubelet[1712]: E1213 02:03:08.065223 1712 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.89:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.89:6443: connect: connection refused Dec 13 02:03:08.210638 env[1212]: time="2024-12-13T02:03:08.210579219Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:08.264960 env[1212]: time="2024-12-13T02:03:08.264930454Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:08.288129 kubelet[1712]: E1213 02:03:08.288077 1712 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.89:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.89:6443: connect: connection refused" interval="3.2s" Dec 13 02:03:08.298273 env[1212]: time="2024-12-13T02:03:08.298152665Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:08.315809 env[1212]: time="2024-12-13T02:03:08.315759956Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:08.390608 kubelet[1712]: I1213 02:03:08.390569 1712 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 02:03:08.390911 kubelet[1712]: E1213 02:03:08.390822 1712 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.89:6443/api/v1/nodes\": dial tcp 10.0.0.89:6443: connect: connection refused" node="localhost" Dec 13 02:03:08.392844 env[1212]: time="2024-12-13T02:03:08.392798582Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:08.433563 env[1212]: time="2024-12-13T02:03:08.433536566Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:08.440825 env[1212]: time="2024-12-13T02:03:08.440778633Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:08.454651 env[1212]: time="2024-12-13T02:03:08.454617678Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:08.456043 env[1212]: time="2024-12-13T02:03:08.456007781Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:08.457155 env[1212]: time="2024-12-13T02:03:08.457133987Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:08.459588 env[1212]: time="2024-12-13T02:03:08.459557017Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:08.461209 env[1212]: time="2024-12-13T02:03:08.461181251Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:08.479141 env[1212]: time="2024-12-13T02:03:08.479056747Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:03:08.479141 env[1212]: time="2024-12-13T02:03:08.479094410Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:03:08.479141 env[1212]: time="2024-12-13T02:03:08.479117254Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:03:08.479355 env[1212]: time="2024-12-13T02:03:08.479253165Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6f8e4697993c90e8c0740bc2faa324c7e0a8fc262fc21e1479966b9c270815c8 pid=1752 runtime=io.containerd.runc.v2 Dec 13 02:03:08.491795 systemd[1]: Started cri-containerd-6f8e4697993c90e8c0740bc2faa324c7e0a8fc262fc21e1479966b9c270815c8.scope. Dec 13 02:03:08.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.502000 audit: BPF prog-id=58 op=LOAD Dec 13 02:03:08.503000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.503000 audit[1762]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1752 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:08.503000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666386534363937393933633930653863303734306263326661613332 Dec 13 02:03:08.503000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.503000 audit[1762]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1752 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:08.503000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666386534363937393933633930653863303734306263326661613332 Dec 13 02:03:08.503000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.503000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.503000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.503000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.503000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.503000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.503000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.503000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.503000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.503000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.503000 audit: BPF prog-id=59 op=LOAD Dec 13 02:03:08.503000 audit[1762]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025230 items=0 ppid=1752 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:08.503000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666386534363937393933633930653863303734306263326661613332 Dec 13 02:03:08.503000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.503000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.503000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.503000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.503000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.503000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.503000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.503000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.503000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.503000 audit: BPF prog-id=60 op=LOAD Dec 13 02:03:08.503000 audit[1762]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025278 items=0 ppid=1752 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:08.503000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666386534363937393933633930653863303734306263326661613332 Dec 13 02:03:08.503000 audit: BPF prog-id=60 op=UNLOAD Dec 13 02:03:08.503000 audit: BPF prog-id=59 op=UNLOAD Dec 13 02:03:08.503000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.503000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.503000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.503000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.503000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.503000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.503000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.503000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.503000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.503000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.503000 audit: BPF prog-id=61 op=LOAD Dec 13 02:03:08.503000 audit[1762]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025688 items=0 ppid=1752 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:08.503000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666386534363937393933633930653863303734306263326661613332 Dec 13 02:03:08.526692 env[1212]: time="2024-12-13T02:03:08.526653783Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:4bff9088ddb27ae6c87cab3714f15485,Namespace:kube-system,Attempt:0,} returns sandbox id \"6f8e4697993c90e8c0740bc2faa324c7e0a8fc262fc21e1479966b9c270815c8\"" Dec 13 02:03:08.527538 kubelet[1712]: E1213 02:03:08.527517 1712 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:08.534183 env[1212]: time="2024-12-13T02:03:08.534147674Z" level=info msg="CreateContainer within sandbox \"6f8e4697993c90e8c0740bc2faa324c7e0a8fc262fc21e1479966b9c270815c8\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Dec 13 02:03:08.560222 kubelet[1712]: W1213 02:03:08.560119 1712 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.89:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.89:6443: connect: connection refused Dec 13 02:03:08.560222 kubelet[1712]: E1213 02:03:08.560180 1712 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.89:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.89:6443: connect: connection refused Dec 13 02:03:08.705774 env[1212]: time="2024-12-13T02:03:08.705693049Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:03:08.705774 env[1212]: time="2024-12-13T02:03:08.705751000Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:03:08.705982 env[1212]: time="2024-12-13T02:03:08.705931157Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:03:08.705982 env[1212]: time="2024-12-13T02:03:08.705973218Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:03:08.706053 env[1212]: time="2024-12-13T02:03:08.705985451Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:03:08.706184 env[1212]: time="2024-12-13T02:03:08.705999538Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:03:08.706184 env[1212]: time="2024-12-13T02:03:08.706121403Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/13b3a574dee8a701bfae0fcf9a4661f2d5a0a6e67ca2e3c6ab7243700e224ebd pid=1803 runtime=io.containerd.runc.v2 Dec 13 02:03:08.706634 env[1212]: time="2024-12-13T02:03:08.706382394Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/712460cb7d6e30bc5f83b48cee712e821b28e41df7660b504e4170c4b8b8c08d pid=1800 runtime=io.containerd.runc.v2 Dec 13 02:03:08.717913 env[1212]: time="2024-12-13T02:03:08.717771558Z" level=info msg="CreateContainer within sandbox \"6f8e4697993c90e8c0740bc2faa324c7e0a8fc262fc21e1479966b9c270815c8\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"c29ffe4591a357e5e15d6bdc396df618d9433d418ebb9aa7acf257918f14b00a\"" Dec 13 02:03:08.718831 env[1212]: time="2024-12-13T02:03:08.718797020Z" level=info msg="StartContainer for \"c29ffe4591a357e5e15d6bdc396df618d9433d418ebb9aa7acf257918f14b00a\"" Dec 13 02:03:08.719699 systemd[1]: Started cri-containerd-13b3a574dee8a701bfae0fcf9a4661f2d5a0a6e67ca2e3c6ab7243700e224ebd.scope. Dec 13 02:03:08.720779 systemd[1]: Started cri-containerd-712460cb7d6e30bc5f83b48cee712e821b28e41df7660b504e4170c4b8b8c08d.scope. Dec 13 02:03:08.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.732000 audit: BPF prog-id=62 op=LOAD Dec 13 02:03:08.733000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.733000 audit[1822]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=1800 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:08.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731323436306362376436653330626335663833623438636565373132 Dec 13 02:03:08.733000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.733000 audit[1822]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019f6b0 a2=3c a3=c items=0 ppid=1800 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:08.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731323436306362376436653330626335663833623438636565373132 Dec 13 02:03:08.733000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.733000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.733000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.733000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.733000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.733000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.733000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.733000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.733000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.733000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.733000 audit: BPF prog-id=63 op=LOAD Dec 13 02:03:08.733000 audit[1822]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019f9d8 a2=78 a3=c0000970c0 items=0 ppid=1800 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:08.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731323436306362376436653330626335663833623438636565373132 Dec 13 02:03:08.733000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.733000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.733000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.733000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.733000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.733000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.733000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.733000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.733000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.733000 audit: BPF prog-id=64 op=LOAD Dec 13 02:03:08.733000 audit[1822]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019f770 a2=78 a3=c000097108 items=0 ppid=1800 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:08.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731323436306362376436653330626335663833623438636565373132 Dec 13 02:03:08.733000 audit: BPF prog-id=64 op=UNLOAD Dec 13 02:03:08.733000 audit: BPF prog-id=63 op=UNLOAD Dec 13 02:03:08.733000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.733000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.733000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.733000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.733000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.733000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.733000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.733000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.733000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.733000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.733000 audit: BPF prog-id=65 op=LOAD Dec 13 02:03:08.733000 audit[1822]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019fc30 a2=78 a3=c000097518 items=0 ppid=1800 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:08.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731323436306362376436653330626335663833623438636565373132 Dec 13 02:03:08.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.737000 audit: BPF prog-id=66 op=LOAD Dec 13 02:03:08.737000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.737000 audit[1823]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1803 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:08.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133623361353734646565386137303162666165306663663961343636 Dec 13 02:03:08.737000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.737000 audit[1823]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1803 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:08.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133623361353734646565386137303162666165306663663961343636 Dec 13 02:03:08.738000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.738000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.738000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.738000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.738000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.738000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.738000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.738000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.738000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.738000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.738000 audit: BPF prog-id=67 op=LOAD Dec 13 02:03:08.738000 audit[1823]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002c08e0 items=0 ppid=1803 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:08.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133623361353734646565386137303162666165306663663961343636 Dec 13 02:03:08.739000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.739000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.739000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.739000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.739000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.739000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.739000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.739000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.739000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.739000 audit: BPF prog-id=68 op=LOAD Dec 13 02:03:08.739000 audit[1823]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002c0928 items=0 ppid=1803 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:08.739000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133623361353734646565386137303162666165306663663961343636 Dec 13 02:03:08.739000 audit: BPF prog-id=68 op=UNLOAD Dec 13 02:03:08.739000 audit: BPF prog-id=67 op=UNLOAD Dec 13 02:03:08.739000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.739000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.739000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.739000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.739000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.739000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.739000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.739000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.739000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.739000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.739000 audit: BPF prog-id=69 op=LOAD Dec 13 02:03:08.739000 audit[1823]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002c0d38 items=0 ppid=1803 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:08.739000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133623361353734646565386137303162666165306663663961343636 Dec 13 02:03:08.751425 systemd[1]: Started cri-containerd-c29ffe4591a357e5e15d6bdc396df618d9433d418ebb9aa7acf257918f14b00a.scope. Dec 13 02:03:08.768763 env[1212]: time="2024-12-13T02:03:08.768710280Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:b107a98bcf27297d642d248711a3fc70,Namespace:kube-system,Attempt:0,} returns sandbox id \"13b3a574dee8a701bfae0fcf9a4661f2d5a0a6e67ca2e3c6ab7243700e224ebd\"" Dec 13 02:03:08.769640 kubelet[1712]: E1213 02:03:08.769607 1712 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:08.771419 env[1212]: time="2024-12-13T02:03:08.770945328Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:8a50003978138b3ab9890682eff4eae8,Namespace:kube-system,Attempt:0,} returns sandbox id \"712460cb7d6e30bc5f83b48cee712e821b28e41df7660b504e4170c4b8b8c08d\"" Dec 13 02:03:08.771529 env[1212]: time="2024-12-13T02:03:08.771498121Z" level=info msg="CreateContainer within sandbox \"13b3a574dee8a701bfae0fcf9a4661f2d5a0a6e67ca2e3c6ab7243700e224ebd\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Dec 13 02:03:08.772004 kubelet[1712]: E1213 02:03:08.771736 1712 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:08.773139 env[1212]: time="2024-12-13T02:03:08.773102286Z" level=info msg="CreateContainer within sandbox \"712460cb7d6e30bc5f83b48cee712e821b28e41df7660b504e4170c4b8b8c08d\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Dec 13 02:03:08.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.775000 audit: BPF prog-id=70 op=LOAD Dec 13 02:03:08.775000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.775000 audit[1859]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=1752 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:08.775000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332396666653435393161333537653565313564366264633339366466 Dec 13 02:03:08.775000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.775000 audit[1859]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=1752 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:08.775000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332396666653435393161333537653565313564366264633339366466 Dec 13 02:03:08.775000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.775000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.775000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.775000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.775000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.775000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.775000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.775000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.775000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.775000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.775000 audit: BPF prog-id=71 op=LOAD Dec 13 02:03:08.775000 audit[1859]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00025ff30 items=0 ppid=1752 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:08.775000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332396666653435393161333537653565313564366264633339366466 Dec 13 02:03:08.776000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.776000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.776000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.776000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.776000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.776000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.776000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.776000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.776000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.776000 audit: BPF prog-id=72 op=LOAD Dec 13 02:03:08.776000 audit[1859]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00025ff78 items=0 ppid=1752 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:08.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332396666653435393161333537653565313564366264633339366466 Dec 13 02:03:08.776000 audit: BPF prog-id=72 op=UNLOAD Dec 13 02:03:08.776000 audit: BPF prog-id=71 op=UNLOAD Dec 13 02:03:08.776000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.776000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.776000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.776000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.776000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.776000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.776000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.776000 audit[1859]: AVC avc: denied { perfmon } for pid=1859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.776000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.776000 audit[1859]: AVC avc: denied { bpf } for pid=1859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.776000 audit: BPF prog-id=73 op=LOAD Dec 13 02:03:08.776000 audit[1859]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003e2388 items=0 ppid=1752 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:08.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332396666653435393161333537653565313564366264633339366466 Dec 13 02:03:08.794388 env[1212]: time="2024-12-13T02:03:08.794335861Z" level=info msg="CreateContainer within sandbox \"712460cb7d6e30bc5f83b48cee712e821b28e41df7660b504e4170c4b8b8c08d\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"63913c18e041e0c5ff0fd4aa9b6d10cb0282578513403ba34b319be6774f5bcb\"" Dec 13 02:03:08.794955 env[1212]: time="2024-12-13T02:03:08.794936827Z" level=info msg="StartContainer for \"63913c18e041e0c5ff0fd4aa9b6d10cb0282578513403ba34b319be6774f5bcb\"" Dec 13 02:03:08.798179 env[1212]: time="2024-12-13T02:03:08.798152631Z" level=info msg="CreateContainer within sandbox \"13b3a574dee8a701bfae0fcf9a4661f2d5a0a6e67ca2e3c6ab7243700e224ebd\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"6cf22f34e1e9179cf3c29e9fdc74fdbaadc3f87ad01b87b75e67a949e583253f\"" Dec 13 02:03:08.798564 env[1212]: time="2024-12-13T02:03:08.798543503Z" level=info msg="StartContainer for \"6cf22f34e1e9179cf3c29e9fdc74fdbaadc3f87ad01b87b75e67a949e583253f\"" Dec 13 02:03:08.806930 env[1212]: time="2024-12-13T02:03:08.804091001Z" level=info msg="StartContainer for \"c29ffe4591a357e5e15d6bdc396df618d9433d418ebb9aa7acf257918f14b00a\" returns successfully" Dec 13 02:03:08.812469 systemd[1]: Started cri-containerd-63913c18e041e0c5ff0fd4aa9b6d10cb0282578513403ba34b319be6774f5bcb.scope. Dec 13 02:03:08.821369 systemd[1]: Started cri-containerd-6cf22f34e1e9179cf3c29e9fdc74fdbaadc3f87ad01b87b75e67a949e583253f.scope. Dec 13 02:03:08.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.834000 audit: BPF prog-id=74 op=LOAD Dec 13 02:03:08.835000 audit[1932]: AVC avc: denied { bpf } for pid=1932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.835000 audit[1932]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1803 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:08.835000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663663232663334653165393137396366336332396539666463373466 Dec 13 02:03:08.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.837000 audit: BPF prog-id=75 op=LOAD Dec 13 02:03:08.837000 audit[1932]: AVC avc: denied { perfmon } for pid=1932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.837000 audit[1932]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1803 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:08.837000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663663232663334653165393137396366336332396539666463373466 Dec 13 02:03:08.837000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.837000 audit[1913]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1800 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:08.837000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633393133633138653034316530633566663066643461613962366431 Dec 13 02:03:08.837000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.837000 audit[1913]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1800 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:08.837000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633393133633138653034316530633566663066643461613962366431 Dec 13 02:03:08.837000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.837000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.837000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.837000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.837000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.837000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.837000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.837000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.837000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.837000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.837000 audit: BPF prog-id=76 op=LOAD Dec 13 02:03:08.837000 audit[1913]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002929a0 items=0 ppid=1800 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:08.837000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633393133633138653034316530633566663066643461613962366431 Dec 13 02:03:08.837000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.837000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.837000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.837000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.837000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.837000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.837000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.837000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.837000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.837000 audit: BPF prog-id=77 op=LOAD Dec 13 02:03:08.837000 audit[1913]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002929e8 items=0 ppid=1800 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:08.837000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633393133633138653034316530633566663066643461613962366431 Dec 13 02:03:08.837000 audit: BPF prog-id=77 op=UNLOAD Dec 13 02:03:08.838000 audit: BPF prog-id=76 op=UNLOAD Dec 13 02:03:08.838000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.838000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.838000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.838000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.838000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.838000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.838000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.838000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.838000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.838000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.838000 audit: BPF prog-id=78 op=LOAD Dec 13 02:03:08.838000 audit[1913]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000292df8 items=0 ppid=1800 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:08.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633393133633138653034316530633566663066643461613962366431 Dec 13 02:03:08.839000 audit[1932]: AVC avc: denied { bpf } for pid=1932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.839000 audit[1932]: AVC avc: denied { bpf } for pid=1932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.839000 audit[1932]: AVC avc: denied { bpf } for pid=1932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.839000 audit[1932]: AVC avc: denied { perfmon } for pid=1932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.839000 audit[1932]: AVC avc: denied { perfmon } for pid=1932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.839000 audit[1932]: AVC avc: denied { perfmon } for pid=1932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.839000 audit[1932]: AVC avc: denied { perfmon } for pid=1932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.839000 audit[1932]: AVC avc: denied { perfmon } for pid=1932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.839000 audit[1932]: AVC avc: denied { bpf } for pid=1932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.839000 audit[1932]: AVC avc: denied { bpf } for pid=1932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.839000 audit: BPF prog-id=79 op=LOAD Dec 13 02:03:08.839000 audit[1932]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00034bd00 items=0 ppid=1803 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:08.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663663232663334653165393137396366336332396539666463373466 Dec 13 02:03:08.839000 audit[1932]: AVC avc: denied { bpf } for pid=1932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.839000 audit[1932]: AVC avc: denied { bpf } for pid=1932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.839000 audit[1932]: AVC avc: denied { perfmon } for pid=1932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.839000 audit[1932]: AVC avc: denied { perfmon } for pid=1932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.839000 audit[1932]: AVC avc: denied { perfmon } for pid=1932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.839000 audit[1932]: AVC avc: denied { perfmon } for pid=1932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.839000 audit[1932]: AVC avc: denied { perfmon } for pid=1932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.839000 audit[1932]: AVC avc: denied { bpf } for pid=1932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.839000 audit[1932]: AVC avc: denied { bpf } for pid=1932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.839000 audit: BPF prog-id=80 op=LOAD Dec 13 02:03:08.839000 audit[1932]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00034bd48 items=0 ppid=1803 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:08.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663663232663334653165393137396366336332396539666463373466 Dec 13 02:03:08.840000 audit: BPF prog-id=80 op=UNLOAD Dec 13 02:03:08.840000 audit: BPF prog-id=79 op=UNLOAD Dec 13 02:03:08.840000 audit[1932]: AVC avc: denied { bpf } for pid=1932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.840000 audit[1932]: AVC avc: denied { bpf } for pid=1932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.840000 audit[1932]: AVC avc: denied { bpf } for pid=1932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.840000 audit[1932]: AVC avc: denied { perfmon } for pid=1932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.840000 audit[1932]: AVC avc: denied { perfmon } for pid=1932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.840000 audit[1932]: AVC avc: denied { perfmon } for pid=1932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.840000 audit[1932]: AVC avc: denied { perfmon } for pid=1932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.840000 audit[1932]: AVC avc: denied { perfmon } for pid=1932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.840000 audit[1932]: AVC avc: denied { bpf } for pid=1932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.840000 audit[1932]: AVC avc: denied { bpf } for pid=1932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:08.840000 audit: BPF prog-id=81 op=LOAD Dec 13 02:03:08.840000 audit[1932]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003ca158 items=0 ppid=1803 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:08.840000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663663232663334653165393137396366336332396539666463373466 Dec 13 02:03:08.863097 env[1212]: time="2024-12-13T02:03:08.863057192Z" level=info msg="StartContainer for \"63913c18e041e0c5ff0fd4aa9b6d10cb0282578513403ba34b319be6774f5bcb\" returns successfully" Dec 13 02:03:08.874218 env[1212]: time="2024-12-13T02:03:08.874174151Z" level=info msg="StartContainer for \"6cf22f34e1e9179cf3c29e9fdc74fdbaadc3f87ad01b87b75e67a949e583253f\" returns successfully" Dec 13 02:03:09.309666 kubelet[1712]: E1213 02:03:09.309621 1712 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:09.311703 kubelet[1712]: E1213 02:03:09.311656 1712 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:09.314452 kubelet[1712]: E1213 02:03:09.314430 1712 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:09.646000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c5,c616 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:03:09.652741 kernel: kauditd_printk_skb: 557 callbacks suppressed Dec 13 02:03:09.652916 kernel: audit: type=1400 audit(1734055389.646:538): avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c5,c616 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:03:09.646000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c005aa3380 a2=fc6 a3=0 items=0 ppid=1752 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c5,c616 key=(null) Dec 13 02:03:09.657911 kernel: audit: type=1300 audit(1734055389.646:538): arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c005aa3380 a2=fc6 a3=0 items=0 ppid=1752 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c5,c616 key=(null) Dec 13 02:03:09.646000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 02:03:09.668813 kernel: audit: type=1327 audit(1734055389.646:538): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 02:03:09.668942 kernel: audit: type=1400 audit(1734055389.664:539): avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=8230 scontext=system_u:system_r:svirt_lxc_net_t:s0:c5,c616 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:03:09.664000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=8230 scontext=system_u:system_r:svirt_lxc_net_t:s0:c5,c616 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:03:09.664000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=51 a1=c0068c6e70 a2=fc6 a3=0 items=0 ppid=1752 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c5,c616 key=(null) Dec 13 02:03:09.674913 kernel: audit: type=1300 audit(1734055389.664:539): arch=c000003e syscall=254 success=no exit=-13 a0=51 a1=c0068c6e70 a2=fc6 a3=0 items=0 ppid=1752 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c5,c616 key=(null) Dec 13 02:03:09.664000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 02:03:09.664000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c5,c616 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:03:09.684584 kernel: audit: type=1327 audit(1734055389.664:539): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 02:03:09.684628 kernel: audit: type=1400 audit(1734055389.664:540): avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c5,c616 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:03:09.684644 kernel: audit: type=1300 audit(1734055389.664:540): arch=c000003e syscall=254 success=no exit=-13 a0=51 a1=c0068c6ea0 a2=fc6 a3=0 items=0 ppid=1752 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c5,c616 key=(null) Dec 13 02:03:09.664000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=51 a1=c0068c6ea0 a2=fc6 a3=0 items=0 ppid=1752 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c5,c616 key=(null) Dec 13 02:03:09.693476 kernel: audit: type=1327 audit(1734055389.664:540): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 02:03:09.664000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 02:03:09.697237 kernel: audit: type=1400 audit(1734055389.664:541): avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8228 scontext=system_u:system_r:svirt_lxc_net_t:s0:c5,c616 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:03:09.664000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8228 scontext=system_u:system_r:svirt_lxc_net_t:s0:c5,c616 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:03:09.664000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=51 a1=c009556a60 a2=fc6 a3=0 items=0 ppid=1752 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c5,c616 key=(null) Dec 13 02:03:09.664000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 02:03:09.665000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8228 scontext=system_u:system_r:svirt_lxc_net_t:s0:c5,c616 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:03:09.665000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=51 a1=c009556a80 a2=fc6 a3=0 items=0 ppid=1752 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c5,c616 key=(null) Dec 13 02:03:09.665000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 02:03:09.665000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c5,c616 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:03:09.665000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=53 a1=c0068c6ff0 a2=fc6 a3=0 items=0 ppid=1752 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c5,c616 key=(null) Dec 13 02:03:09.665000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 02:03:09.728000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c279,c502 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:03:09.728000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000857b90 a2=fc6 a3=0 items=0 ppid=1800 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c279,c502 key=(null) Dec 13 02:03:09.728000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:03:09.728000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8228 scontext=system_u:system_r:svirt_lxc_net_t:s0:c279,c502 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:03:09.728000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000581140 a2=fc6 a3=0 items=0 ppid=1800 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c279,c502 key=(null) Dec 13 02:03:09.728000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:03:10.055792 kubelet[1712]: E1213 02:03:10.055742 1712 csi_plugin.go:308] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "localhost" not found Dec 13 02:03:10.251534 kubelet[1712]: I1213 02:03:10.251485 1712 apiserver.go:52] "Watching apiserver" Dec 13 02:03:10.283198 kubelet[1712]: I1213 02:03:10.283151 1712 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Dec 13 02:03:10.316018 kubelet[1712]: E1213 02:03:10.315929 1712 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:10.421136 kubelet[1712]: E1213 02:03:10.421090 1712 csi_plugin.go:308] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "localhost" not found Dec 13 02:03:10.842325 kubelet[1712]: E1213 02:03:10.842288 1712 csi_plugin.go:308] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "localhost" not found Dec 13 02:03:11.492298 kubelet[1712]: E1213 02:03:11.492256 1712 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" Dec 13 02:03:11.592935 kubelet[1712]: I1213 02:03:11.592902 1712 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 02:03:11.600336 kubelet[1712]: I1213 02:03:11.600316 1712 kubelet_node_status.go:76] "Successfully registered node" node="localhost" Dec 13 02:03:12.079337 systemd[1]: Reloading. Dec 13 02:03:12.147326 /usr/lib/systemd/system-generators/torcx-generator[2009]: time="2024-12-13T02:03:12Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:03:12.147359 /usr/lib/systemd/system-generators/torcx-generator[2009]: time="2024-12-13T02:03:12Z" level=info msg="torcx already run" Dec 13 02:03:12.209687 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:03:12.209704 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:03:12.226129 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:03:12.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.290000 audit: BPF prog-id=82 op=LOAD Dec 13 02:03:12.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.290000 audit: BPF prog-id=83 op=LOAD Dec 13 02:03:12.290000 audit: BPF prog-id=43 op=UNLOAD Dec 13 02:03:12.290000 audit: BPF prog-id=44 op=UNLOAD Dec 13 02:03:12.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.291000 audit: BPF prog-id=84 op=LOAD Dec 13 02:03:12.291000 audit: BPF prog-id=70 op=UNLOAD Dec 13 02:03:12.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.292000 audit: BPF prog-id=85 op=LOAD Dec 13 02:03:12.292000 audit: BPF prog-id=45 op=UNLOAD Dec 13 02:03:12.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.292000 audit: BPF prog-id=86 op=LOAD Dec 13 02:03:12.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.292000 audit: BPF prog-id=87 op=LOAD Dec 13 02:03:12.292000 audit: BPF prog-id=46 op=UNLOAD Dec 13 02:03:12.292000 audit: BPF prog-id=47 op=UNLOAD Dec 13 02:03:12.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.292000 audit: BPF prog-id=88 op=LOAD Dec 13 02:03:12.292000 audit: BPF prog-id=48 op=UNLOAD Dec 13 02:03:12.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.293000 audit: BPF prog-id=89 op=LOAD Dec 13 02:03:12.293000 audit: BPF prog-id=49 op=UNLOAD Dec 13 02:03:12.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.294000 audit: BPF prog-id=90 op=LOAD Dec 13 02:03:12.294000 audit: BPF prog-id=62 op=UNLOAD Dec 13 02:03:12.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.295000 audit: BPF prog-id=91 op=LOAD Dec 13 02:03:12.295000 audit: BPF prog-id=75 op=UNLOAD Dec 13 02:03:12.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.295000 audit: BPF prog-id=92 op=LOAD Dec 13 02:03:12.295000 audit: BPF prog-id=74 op=UNLOAD Dec 13 02:03:12.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.296000 audit: BPF prog-id=93 op=LOAD Dec 13 02:03:12.296000 audit: BPF prog-id=50 op=UNLOAD Dec 13 02:03:12.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.297000 audit: BPF prog-id=94 op=LOAD Dec 13 02:03:12.297000 audit: BPF prog-id=51 op=UNLOAD Dec 13 02:03:12.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.297000 audit: BPF prog-id=95 op=LOAD Dec 13 02:03:12.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.297000 audit: BPF prog-id=96 op=LOAD Dec 13 02:03:12.297000 audit: BPF prog-id=52 op=UNLOAD Dec 13 02:03:12.297000 audit: BPF prog-id=53 op=UNLOAD Dec 13 02:03:12.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.298000 audit: BPF prog-id=97 op=LOAD Dec 13 02:03:12.298000 audit: BPF prog-id=54 op=UNLOAD Dec 13 02:03:12.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.298000 audit: BPF prog-id=98 op=LOAD Dec 13 02:03:12.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.298000 audit: BPF prog-id=99 op=LOAD Dec 13 02:03:12.298000 audit: BPF prog-id=55 op=UNLOAD Dec 13 02:03:12.298000 audit: BPF prog-id=56 op=UNLOAD Dec 13 02:03:12.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.299000 audit: BPF prog-id=100 op=LOAD Dec 13 02:03:12.299000 audit: BPF prog-id=58 op=UNLOAD Dec 13 02:03:12.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.300000 audit: BPF prog-id=101 op=LOAD Dec 13 02:03:12.300000 audit: BPF prog-id=57 op=UNLOAD Dec 13 02:03:12.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.301000 audit: BPF prog-id=102 op=LOAD Dec 13 02:03:12.301000 audit: BPF prog-id=66 op=UNLOAD Dec 13 02:03:12.312568 kubelet[1712]: I1213 02:03:12.312370 1712 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 02:03:12.312417 systemd[1]: Stopping kubelet.service... Dec 13 02:03:12.339188 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 02:03:12.339374 systemd[1]: Stopped kubelet.service. Dec 13 02:03:12.338000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:12.341013 systemd[1]: Starting kubelet.service... Dec 13 02:03:12.418110 systemd[1]: Started kubelet.service. Dec 13 02:03:12.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:12.434000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8228 scontext=system_u:system_r:svirt_lxc_net_t:s0:c279,c502 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:03:12.434000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000d0b700 a2=fc6 a3=0 items=0 ppid=1800 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c279,c502 key=(null) Dec 13 02:03:12.434000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:03:12.434000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8228 scontext=system_u:system_r:svirt_lxc_net_t:s0:c279,c502 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:03:12.434000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000d0b740 a2=fc6 a3=0 items=0 ppid=1800 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c279,c502 key=(null) Dec 13 02:03:12.434000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:03:12.434000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8228 scontext=system_u:system_r:svirt_lxc_net_t:s0:c279,c502 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:03:12.434000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000d0b780 a2=fc6 a3=0 items=0 ppid=1800 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c279,c502 key=(null) Dec 13 02:03:12.434000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:03:12.434000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8228 scontext=system_u:system_r:svirt_lxc_net_t:s0:c279,c502 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:03:12.434000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000d0b7c0 a2=fc6 a3=0 items=0 ppid=1800 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c279,c502 key=(null) Dec 13 02:03:12.434000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:03:12.463659 kubelet[2056]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 02:03:12.464191 kubelet[2056]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 02:03:12.464253 kubelet[2056]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 02:03:12.464688 kubelet[2056]: I1213 02:03:12.464642 2056 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 02:03:12.468855 kubelet[2056]: I1213 02:03:12.468820 2056 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Dec 13 02:03:12.468855 kubelet[2056]: I1213 02:03:12.468848 2056 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 02:03:12.469094 kubelet[2056]: I1213 02:03:12.469073 2056 server.go:927] "Client rotation is on, will bootstrap in background" Dec 13 02:03:12.470266 kubelet[2056]: I1213 02:03:12.470245 2056 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Dec 13 02:03:12.471289 kubelet[2056]: I1213 02:03:12.471249 2056 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 02:03:12.475000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=8270 scontext=system_u:system_r:svirt_lxc_net_t:s0:c279,c502 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 02:03:12.475000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000ba9d80 a2=fc6 a3=0 items=0 ppid=1800 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c279,c502 key=(null) Dec 13 02:03:12.475000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:03:12.478022 kubelet[2056]: I1213 02:03:12.477999 2056 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 02:03:12.478201 kubelet[2056]: I1213 02:03:12.478153 2056 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 02:03:12.478461 kubelet[2056]: I1213 02:03:12.478198 2056 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 02:03:12.478565 kubelet[2056]: I1213 02:03:12.478472 2056 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 02:03:12.478565 kubelet[2056]: I1213 02:03:12.478483 2056 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 02:03:12.478565 kubelet[2056]: I1213 02:03:12.478515 2056 state_mem.go:36] "Initialized new in-memory state store" Dec 13 02:03:12.478629 kubelet[2056]: I1213 02:03:12.478587 2056 kubelet.go:400] "Attempting to sync node with API server" Dec 13 02:03:12.478629 kubelet[2056]: I1213 02:03:12.478597 2056 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 02:03:12.478629 kubelet[2056]: I1213 02:03:12.478614 2056 kubelet.go:312] "Adding apiserver pod source" Dec 13 02:03:12.478629 kubelet[2056]: I1213 02:03:12.478627 2056 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 02:03:12.481422 kubelet[2056]: I1213 02:03:12.479609 2056 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 02:03:12.481422 kubelet[2056]: I1213 02:03:12.480563 2056 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 02:03:12.481422 kubelet[2056]: I1213 02:03:12.480976 2056 server.go:1264] "Started kubelet" Dec 13 02:03:12.486065 kubelet[2056]: I1213 02:03:12.486029 2056 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 02:03:12.487237 kubelet[2056]: I1213 02:03:12.487213 2056 server.go:455] "Adding debug handlers to kubelet server" Dec 13 02:03:12.486000 audit[2056]: AVC avc: denied { mac_admin } for pid=2056 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.486000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:03:12.486000 audit[2056]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000aac6f0 a1=c000ac8168 a2=c000aac6c0 a3=25 items=0 ppid=1 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:12.486000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:03:12.487559 kubelet[2056]: I1213 02:03:12.487532 2056 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 02:03:12.486000 audit[2056]: AVC avc: denied { mac_admin } for pid=2056 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.486000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:03:12.486000 audit[2056]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000777ba0 a1=c000ac8180 a2=c000aac780 a3=25 items=0 ppid=1 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:12.486000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:03:12.487800 kubelet[2056]: I1213 02:03:12.487781 2056 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 02:03:12.487903 kubelet[2056]: I1213 02:03:12.487875 2056 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 02:03:12.488144 kubelet[2056]: I1213 02:03:12.488091 2056 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 02:03:12.488285 kubelet[2056]: I1213 02:03:12.488264 2056 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 02:03:12.489343 kubelet[2056]: I1213 02:03:12.489324 2056 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 02:03:12.489639 kubelet[2056]: I1213 02:03:12.489613 2056 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Dec 13 02:03:12.490312 kubelet[2056]: I1213 02:03:12.490285 2056 reconciler.go:26] "Reconciler: start to sync state" Dec 13 02:03:12.493271 kubelet[2056]: I1213 02:03:12.493256 2056 factory.go:221] Registration of the systemd container factory successfully Dec 13 02:03:12.493590 kubelet[2056]: I1213 02:03:12.493565 2056 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 02:03:12.494985 kubelet[2056]: E1213 02:03:12.494962 2056 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 02:03:12.496226 kubelet[2056]: I1213 02:03:12.496209 2056 factory.go:221] Registration of the containerd container factory successfully Dec 13 02:03:12.502830 kubelet[2056]: I1213 02:03:12.502802 2056 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 02:03:12.503659 kubelet[2056]: I1213 02:03:12.503645 2056 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 02:03:12.503742 kubelet[2056]: I1213 02:03:12.503729 2056 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 02:03:12.503833 kubelet[2056]: I1213 02:03:12.503819 2056 kubelet.go:2337] "Starting kubelet main sync loop" Dec 13 02:03:12.503955 kubelet[2056]: E1213 02:03:12.503936 2056 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 02:03:12.522046 kubelet[2056]: I1213 02:03:12.522010 2056 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 02:03:12.522046 kubelet[2056]: I1213 02:03:12.522031 2056 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 02:03:12.522046 kubelet[2056]: I1213 02:03:12.522048 2056 state_mem.go:36] "Initialized new in-memory state store" Dec 13 02:03:12.522354 kubelet[2056]: I1213 02:03:12.522321 2056 state_mem.go:88] "Updated default CPUSet" cpuSet="" Dec 13 02:03:12.522389 kubelet[2056]: I1213 02:03:12.522353 2056 state_mem.go:96] "Updated CPUSet assignments" assignments={} Dec 13 02:03:12.522389 kubelet[2056]: I1213 02:03:12.522377 2056 policy_none.go:49] "None policy: Start" Dec 13 02:03:12.523212 kubelet[2056]: I1213 02:03:12.523193 2056 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 02:03:12.523303 kubelet[2056]: I1213 02:03:12.523289 2056 state_mem.go:35] "Initializing new in-memory state store" Dec 13 02:03:12.523553 kubelet[2056]: I1213 02:03:12.523539 2056 state_mem.go:75] "Updated machine memory state" Dec 13 02:03:12.529536 kubelet[2056]: I1213 02:03:12.529512 2056 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 02:03:12.528000 audit[2056]: AVC avc: denied { mac_admin } for pid=2056 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:12.528000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:03:12.528000 audit[2056]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0012e1350 a1=c001362ae0 a2=c0012e1320 a3=25 items=0 ppid=1 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:12.528000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:03:12.529942 kubelet[2056]: I1213 02:03:12.529616 2056 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 02:03:12.529942 kubelet[2056]: I1213 02:03:12.529807 2056 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 02:03:12.529942 kubelet[2056]: I1213 02:03:12.529914 2056 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 02:03:12.593905 kubelet[2056]: I1213 02:03:12.593768 2056 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 02:03:12.599677 kubelet[2056]: I1213 02:03:12.599653 2056 kubelet_node_status.go:112] "Node was previously registered" node="localhost" Dec 13 02:03:12.599788 kubelet[2056]: I1213 02:03:12.599730 2056 kubelet_node_status.go:76] "Successfully registered node" node="localhost" Dec 13 02:03:12.605097 kubelet[2056]: I1213 02:03:12.605062 2056 topology_manager.go:215] "Topology Admit Handler" podUID="4bff9088ddb27ae6c87cab3714f15485" podNamespace="kube-system" podName="kube-apiserver-localhost" Dec 13 02:03:12.605245 kubelet[2056]: I1213 02:03:12.605156 2056 topology_manager.go:215] "Topology Admit Handler" podUID="8a50003978138b3ab9890682eff4eae8" podNamespace="kube-system" podName="kube-controller-manager-localhost" Dec 13 02:03:12.605245 kubelet[2056]: I1213 02:03:12.605218 2056 topology_manager.go:215] "Topology Admit Handler" podUID="b107a98bcf27297d642d248711a3fc70" podNamespace="kube-system" podName="kube-scheduler-localhost" Dec 13 02:03:12.690960 kubelet[2056]: I1213 02:03:12.690767 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/4bff9088ddb27ae6c87cab3714f15485-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"4bff9088ddb27ae6c87cab3714f15485\") " pod="kube-system/kube-apiserver-localhost" Dec 13 02:03:12.690960 kubelet[2056]: I1213 02:03:12.690824 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/8a50003978138b3ab9890682eff4eae8-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"8a50003978138b3ab9890682eff4eae8\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 02:03:12.690960 kubelet[2056]: I1213 02:03:12.690856 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b107a98bcf27297d642d248711a3fc70-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"b107a98bcf27297d642d248711a3fc70\") " pod="kube-system/kube-scheduler-localhost" Dec 13 02:03:12.690960 kubelet[2056]: I1213 02:03:12.690876 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/4bff9088ddb27ae6c87cab3714f15485-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"4bff9088ddb27ae6c87cab3714f15485\") " pod="kube-system/kube-apiserver-localhost" Dec 13 02:03:12.690960 kubelet[2056]: I1213 02:03:12.690965 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/4bff9088ddb27ae6c87cab3714f15485-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"4bff9088ddb27ae6c87cab3714f15485\") " pod="kube-system/kube-apiserver-localhost" Dec 13 02:03:12.691349 kubelet[2056]: I1213 02:03:12.690987 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/8a50003978138b3ab9890682eff4eae8-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"8a50003978138b3ab9890682eff4eae8\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 02:03:12.691349 kubelet[2056]: I1213 02:03:12.691008 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/8a50003978138b3ab9890682eff4eae8-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"8a50003978138b3ab9890682eff4eae8\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 02:03:12.691349 kubelet[2056]: I1213 02:03:12.691031 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/8a50003978138b3ab9890682eff4eae8-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"8a50003978138b3ab9890682eff4eae8\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 02:03:12.691349 kubelet[2056]: I1213 02:03:12.691068 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/8a50003978138b3ab9890682eff4eae8-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"8a50003978138b3ab9890682eff4eae8\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 02:03:12.915082 kubelet[2056]: E1213 02:03:12.914487 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:12.915082 kubelet[2056]: E1213 02:03:12.914842 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:12.915082 kubelet[2056]: E1213 02:03:12.914920 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:13.479696 kubelet[2056]: I1213 02:03:13.479649 2056 apiserver.go:52] "Watching apiserver" Dec 13 02:03:13.490525 kubelet[2056]: I1213 02:03:13.490482 2056 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Dec 13 02:03:13.513787 kubelet[2056]: E1213 02:03:13.513749 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:13.514551 kubelet[2056]: E1213 02:03:13.514514 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:13.514874 kubelet[2056]: E1213 02:03:13.514846 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:13.599750 kubelet[2056]: I1213 02:03:13.599688 2056 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=1.599670321 podStartE2EDuration="1.599670321s" podCreationTimestamp="2024-12-13 02:03:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:03:13.590036902 +0000 UTC m=+1.168721896" watchObservedRunningTime="2024-12-13 02:03:13.599670321 +0000 UTC m=+1.178355325" Dec 13 02:03:13.600098 kubelet[2056]: I1213 02:03:13.600074 2056 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.600067169 podStartE2EDuration="1.600067169s" podCreationTimestamp="2024-12-13 02:03:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:03:13.599459228 +0000 UTC m=+1.178144232" watchObservedRunningTime="2024-12-13 02:03:13.600067169 +0000 UTC m=+1.178752173" Dec 13 02:03:13.605826 kubelet[2056]: I1213 02:03:13.605797 2056 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.6057906119999998 podStartE2EDuration="1.605790612s" podCreationTimestamp="2024-12-13 02:03:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:03:13.605597563 +0000 UTC m=+1.184282557" watchObservedRunningTime="2024-12-13 02:03:13.605790612 +0000 UTC m=+1.184475616" Dec 13 02:03:14.514701 kubelet[2056]: E1213 02:03:14.514666 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:16.101345 kubelet[2056]: E1213 02:03:16.101306 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:16.853561 sudo[1345]: pam_unix(sudo:session): session closed for user root Dec 13 02:03:16.852000 audit[1345]: USER_END pid=1345 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:03:16.854701 kernel: kauditd_printk_skb: 287 callbacks suppressed Dec 13 02:03:16.854843 kernel: audit: type=1106 audit(1734055396.852:800): pid=1345 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:03:16.855037 sshd[1342]: pam_unix(sshd:session): session closed for user core Dec 13 02:03:16.857206 systemd[1]: sshd@6-10.0.0.89:22-10.0.0.1:59816.service: Deactivated successfully. Dec 13 02:03:16.857864 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 02:03:16.858021 systemd[1]: session-7.scope: Consumed 4.009s CPU time. Dec 13 02:03:16.852000 audit[1345]: CRED_DISP pid=1345 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:03:16.858755 systemd-logind[1199]: Session 7 logged out. Waiting for processes to exit. Dec 13 02:03:16.859552 systemd-logind[1199]: Removed session 7. Dec 13 02:03:16.862165 kernel: audit: type=1104 audit(1734055396.852:801): pid=1345 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:03:16.862252 kernel: audit: type=1106 audit(1734055396.854:802): pid=1342 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:16.854000 audit[1342]: USER_END pid=1342 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:16.866441 kernel: audit: type=1104 audit(1734055396.854:803): pid=1342 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:16.854000 audit[1342]: CRED_DISP pid=1342 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:16.854000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.89:22-10.0.0.1:59816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:16.873214 kernel: audit: type=1131 audit(1734055396.854:804): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.89:22-10.0.0.1:59816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:17.048472 kubelet[2056]: E1213 02:03:17.048427 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:19.022229 update_engine[1204]: I1213 02:03:19.022162 1204 update_attempter.cc:509] Updating boot flags... Dec 13 02:03:21.252418 kubelet[2056]: E1213 02:03:21.247645 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:21.524563 kubelet[2056]: E1213 02:03:21.524450 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:25.767876 kubelet[2056]: I1213 02:03:25.767850 2056 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Dec 13 02:03:25.768281 env[1212]: time="2024-12-13T02:03:25.768162686Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 02:03:25.768447 kubelet[2056]: I1213 02:03:25.768312 2056 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Dec 13 02:03:26.105078 kubelet[2056]: E1213 02:03:26.104963 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:26.693127 kubelet[2056]: I1213 02:03:26.693076 2056 topology_manager.go:215] "Topology Admit Handler" podUID="ba94a8c3-9f93-4069-a7a8-0efb038412c4" podNamespace="kube-system" podName="kube-proxy-x859l" Dec 13 02:03:26.698694 systemd[1]: Created slice kubepods-besteffort-podba94a8c3_9f93_4069_a7a8_0efb038412c4.slice. Dec 13 02:03:26.785210 kubelet[2056]: I1213 02:03:26.785167 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/ba94a8c3-9f93-4069-a7a8-0efb038412c4-lib-modules\") pod \"kube-proxy-x859l\" (UID: \"ba94a8c3-9f93-4069-a7a8-0efb038412c4\") " pod="kube-system/kube-proxy-x859l" Dec 13 02:03:26.785210 kubelet[2056]: I1213 02:03:26.785208 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/ba94a8c3-9f93-4069-a7a8-0efb038412c4-kube-proxy\") pod \"kube-proxy-x859l\" (UID: \"ba94a8c3-9f93-4069-a7a8-0efb038412c4\") " pod="kube-system/kube-proxy-x859l" Dec 13 02:03:26.785654 kubelet[2056]: I1213 02:03:26.785225 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/ba94a8c3-9f93-4069-a7a8-0efb038412c4-xtables-lock\") pod \"kube-proxy-x859l\" (UID: \"ba94a8c3-9f93-4069-a7a8-0efb038412c4\") " pod="kube-system/kube-proxy-x859l" Dec 13 02:03:26.785654 kubelet[2056]: I1213 02:03:26.785240 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9rsc7\" (UniqueName: \"kubernetes.io/projected/ba94a8c3-9f93-4069-a7a8-0efb038412c4-kube-api-access-9rsc7\") pod \"kube-proxy-x859l\" (UID: \"ba94a8c3-9f93-4069-a7a8-0efb038412c4\") " pod="kube-system/kube-proxy-x859l" Dec 13 02:03:26.804868 kubelet[2056]: I1213 02:03:26.804815 2056 topology_manager.go:215] "Topology Admit Handler" podUID="73a09b4b-4296-48f9-9fef-96bc4251f172" podNamespace="tigera-operator" podName="tigera-operator-7bc55997bb-slctj" Dec 13 02:03:26.810390 systemd[1]: Created slice kubepods-besteffort-pod73a09b4b_4296_48f9_9fef_96bc4251f172.slice. Dec 13 02:03:26.885716 kubelet[2056]: I1213 02:03:26.885666 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/73a09b4b-4296-48f9-9fef-96bc4251f172-var-lib-calico\") pod \"tigera-operator-7bc55997bb-slctj\" (UID: \"73a09b4b-4296-48f9-9fef-96bc4251f172\") " pod="tigera-operator/tigera-operator-7bc55997bb-slctj" Dec 13 02:03:26.885716 kubelet[2056]: I1213 02:03:26.885703 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zf9xw\" (UniqueName: \"kubernetes.io/projected/73a09b4b-4296-48f9-9fef-96bc4251f172-kube-api-access-zf9xw\") pod \"tigera-operator-7bc55997bb-slctj\" (UID: \"73a09b4b-4296-48f9-9fef-96bc4251f172\") " pod="tigera-operator/tigera-operator-7bc55997bb-slctj" Dec 13 02:03:27.011244 kubelet[2056]: E1213 02:03:27.011160 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:27.011607 env[1212]: time="2024-12-13T02:03:27.011548081Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-x859l,Uid:ba94a8c3-9f93-4069-a7a8-0efb038412c4,Namespace:kube-system,Attempt:0,}" Dec 13 02:03:27.027716 env[1212]: time="2024-12-13T02:03:27.027650144Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:03:27.027716 env[1212]: time="2024-12-13T02:03:27.027685491Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:03:27.027716 env[1212]: time="2024-12-13T02:03:27.027695710Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:03:27.027875 env[1212]: time="2024-12-13T02:03:27.027808674Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/de9e310ab144c2369365d461a53fdb89a209ccc6718b13adcfdd702d6efd2246 pid=2168 runtime=io.containerd.runc.v2 Dec 13 02:03:27.040214 systemd[1]: Started cri-containerd-de9e310ab144c2369365d461a53fdb89a209ccc6718b13adcfdd702d6efd2246.scope. Dec 13 02:03:27.050000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.050000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.056939 kubelet[2056]: E1213 02:03:27.056920 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:27.057045 kernel: audit: type=1400 audit(1734055407.050:805): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.057082 kernel: audit: type=1400 audit(1734055407.050:806): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.057098 kernel: audit: type=1400 audit(1734055407.050:807): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.050000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.066824 kernel: audit: type=1400 audit(1734055407.050:808): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.066960 kernel: audit: type=1400 audit(1734055407.050:809): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.070927 kernel: audit: type=1400 audit(1734055407.050:810): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.078058 kernel: audit: type=1400 audit(1734055407.050:811): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.078129 kernel: audit: type=1400 audit(1734055407.050:812): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.050000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.081314 kernel: audit: type=1400 audit(1734055407.050:813): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.081382 kernel: audit: type=1400 audit(1734055407.056:814): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.082066 env[1212]: time="2024-12-13T02:03:27.082023807Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-x859l,Uid:ba94a8c3-9f93-4069-a7a8-0efb038412c4,Namespace:kube-system,Attempt:0,} returns sandbox id \"de9e310ab144c2369365d461a53fdb89a209ccc6718b13adcfdd702d6efd2246\"" Dec 13 02:03:27.082818 kubelet[2056]: E1213 02:03:27.082796 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:27.056000 audit: BPF prog-id=103 op=LOAD Dec 13 02:03:27.056000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.056000 audit[2178]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2168 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.056000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465396533313061623134346332333639333635643436316135336664 Dec 13 02:03:27.056000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.056000 audit[2178]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2168 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.056000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465396533313061623134346332333639333635643436316135336664 Dec 13 02:03:27.056000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.056000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.056000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.056000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.056000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.056000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.056000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.056000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.056000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.056000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.056000 audit: BPF prog-id=104 op=LOAD Dec 13 02:03:27.056000 audit[2178]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c00019a650 items=0 ppid=2168 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.056000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465396533313061623134346332333639333635643436316135336664 Dec 13 02:03:27.059000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.059000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.059000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.059000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.059000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.059000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.059000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.059000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.059000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.059000 audit: BPF prog-id=105 op=LOAD Dec 13 02:03:27.059000 audit[2178]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c00019a698 items=0 ppid=2168 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.059000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465396533313061623134346332333639333635643436316135336664 Dec 13 02:03:27.062000 audit: BPF prog-id=105 op=UNLOAD Dec 13 02:03:27.062000 audit: BPF prog-id=104 op=UNLOAD Dec 13 02:03:27.062000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.062000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.062000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.062000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.062000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.062000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.062000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.062000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.062000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.062000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.062000 audit: BPF prog-id=106 op=LOAD Dec 13 02:03:27.062000 audit[2178]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c00019aaa8 items=0 ppid=2168 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465396533313061623134346332333639333635643436316135336664 Dec 13 02:03:27.087430 env[1212]: time="2024-12-13T02:03:27.086068699Z" level=info msg="CreateContainer within sandbox \"de9e310ab144c2369365d461a53fdb89a209ccc6718b13adcfdd702d6efd2246\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 02:03:27.115344 env[1212]: time="2024-12-13T02:03:27.115303996Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7bc55997bb-slctj,Uid:73a09b4b-4296-48f9-9fef-96bc4251f172,Namespace:tigera-operator,Attempt:0,}" Dec 13 02:03:27.146003 env[1212]: time="2024-12-13T02:03:27.145960908Z" level=info msg="CreateContainer within sandbox \"de9e310ab144c2369365d461a53fdb89a209ccc6718b13adcfdd702d6efd2246\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"6ce4ebd525d3af5ef1baa92c219629312cb922464bf7cdd44ad1c25302ccc949\"" Dec 13 02:03:27.146613 env[1212]: time="2024-12-13T02:03:27.146548908Z" level=info msg="StartContainer for \"6ce4ebd525d3af5ef1baa92c219629312cb922464bf7cdd44ad1c25302ccc949\"" Dec 13 02:03:27.160652 systemd[1]: Started cri-containerd-6ce4ebd525d3af5ef1baa92c219629312cb922464bf7cdd44ad1c25302ccc949.scope. Dec 13 02:03:27.164161 env[1212]: time="2024-12-13T02:03:27.164074661Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:03:27.164310 env[1212]: time="2024-12-13T02:03:27.164154763Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:03:27.164310 env[1212]: time="2024-12-13T02:03:27.164193957Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:03:27.164402 env[1212]: time="2024-12-13T02:03:27.164362004Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e10f4c2e595cd08d5eab5b9876069ecde543f36ffafa6aafb083878560b15900 pid=2226 runtime=io.containerd.runc.v2 Dec 13 02:03:27.173000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.173000 audit[2208]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f61e0b06d58 items=0 ppid=2168 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.173000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663653465626435323564336166356566316261613932633231393632 Dec 13 02:03:27.173000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.173000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.173000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.173000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.173000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.173000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.173000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.173000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.173000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.173000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.173000 audit: BPF prog-id=107 op=LOAD Dec 13 02:03:27.173000 audit[2208]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000302c88 items=0 ppid=2168 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.173000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663653465626435323564336166356566316261613932633231393632 Dec 13 02:03:27.173000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.173000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.173000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.173000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.173000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.173000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.173000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.173000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.173000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.173000 audit: BPF prog-id=108 op=LOAD Dec 13 02:03:27.173000 audit[2208]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000302cd8 items=0 ppid=2168 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.173000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663653465626435323564336166356566316261613932633231393632 Dec 13 02:03:27.173000 audit: BPF prog-id=108 op=UNLOAD Dec 13 02:03:27.173000 audit: BPF prog-id=107 op=UNLOAD Dec 13 02:03:27.173000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.173000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.173000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.173000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.173000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.173000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.173000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.173000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.173000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.173000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.173000 audit: BPF prog-id=109 op=LOAD Dec 13 02:03:27.173000 audit[2208]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000302d68 items=0 ppid=2168 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.173000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663653465626435323564336166356566316261613932633231393632 Dec 13 02:03:27.175488 systemd[1]: Started cri-containerd-e10f4c2e595cd08d5eab5b9876069ecde543f36ffafa6aafb083878560b15900.scope. Dec 13 02:03:27.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.188000 audit: BPF prog-id=110 op=LOAD Dec 13 02:03:27.189000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.189000 audit[2239]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2226 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.189000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531306634633265353935636430386435656162356239383736303639 Dec 13 02:03:27.189000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.189000 audit[2239]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2226 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.189000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531306634633265353935636430386435656162356239383736303639 Dec 13 02:03:27.189000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.189000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.189000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.189000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.189000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.189000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.189000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.189000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.189000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.189000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.189000 audit: BPF prog-id=111 op=LOAD Dec 13 02:03:27.189000 audit[2239]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000212d70 items=0 ppid=2226 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.189000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531306634633265353935636430386435656162356239383736303639 Dec 13 02:03:27.189000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.189000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.189000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.189000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.189000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.189000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.189000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.189000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.189000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.189000 audit: BPF prog-id=112 op=LOAD Dec 13 02:03:27.189000 audit[2239]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000212db8 items=0 ppid=2226 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.189000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531306634633265353935636430386435656162356239383736303639 Dec 13 02:03:27.189000 audit: BPF prog-id=112 op=UNLOAD Dec 13 02:03:27.189000 audit: BPF prog-id=111 op=UNLOAD Dec 13 02:03:27.189000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.189000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.189000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.189000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.189000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.189000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.189000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.189000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.189000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.189000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:27.189000 audit: BPF prog-id=113 op=LOAD Dec 13 02:03:27.189000 audit[2239]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002131c8 items=0 ppid=2226 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.189000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531306634633265353935636430386435656162356239383736303639 Dec 13 02:03:27.195729 env[1212]: time="2024-12-13T02:03:27.195696798Z" level=info msg="StartContainer for \"6ce4ebd525d3af5ef1baa92c219629312cb922464bf7cdd44ad1c25302ccc949\" returns successfully" Dec 13 02:03:27.220106 env[1212]: time="2024-12-13T02:03:27.220058737Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7bc55997bb-slctj,Uid:73a09b4b-4296-48f9-9fef-96bc4251f172,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"e10f4c2e595cd08d5eab5b9876069ecde543f36ffafa6aafb083878560b15900\"" Dec 13 02:03:27.221569 env[1212]: time="2024-12-13T02:03:27.221552058Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Dec 13 02:03:27.248000 audit[2302]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2302 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:27.248000 audit[2302]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc388f2120 a2=0 a3=7ffc388f210c items=0 ppid=2232 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.248000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 02:03:27.248000 audit[2303]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2303 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:27.248000 audit[2303]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd999ffd80 a2=0 a3=7ffd999ffd6c items=0 ppid=2232 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.248000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 02:03:27.249000 audit[2304]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2304 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:27.249000 audit[2304]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe5e7745f0 a2=0 a3=7ffe5e7745dc items=0 ppid=2232 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.249000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 02:03:27.249000 audit[2305]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2305 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:27.249000 audit[2305]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe3f994ae0 a2=0 a3=7ffe3f994acc items=0 ppid=2232 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.249000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 02:03:27.250000 audit[2306]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=2306 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:27.250000 audit[2306]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd0d458640 a2=0 a3=7ffd0d45862c items=0 ppid=2232 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.250000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 02:03:27.252000 audit[2307]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2307 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:27.252000 audit[2307]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffcadb84b0 a2=0 a3=7fffcadb849c items=0 ppid=2232 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.252000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 02:03:27.350000 audit[2308]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2308 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:27.350000 audit[2308]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff777ecf30 a2=0 a3=7fff777ecf1c items=0 ppid=2232 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.350000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 02:03:27.352000 audit[2310]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2310 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:27.352000 audit[2310]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff9fc20410 a2=0 a3=7fff9fc203fc items=0 ppid=2232 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.352000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 02:03:27.356000 audit[2313]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2313 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:27.356000 audit[2313]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffccd0969a0 a2=0 a3=7ffccd09698c items=0 ppid=2232 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.356000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 02:03:27.356000 audit[2314]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2314 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:27.356000 audit[2314]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd7f3af860 a2=0 a3=7ffd7f3af84c items=0 ppid=2232 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.356000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 02:03:27.358000 audit[2316]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2316 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:27.358000 audit[2316]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd0f414e20 a2=0 a3=7ffd0f414e0c items=0 ppid=2232 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.358000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 02:03:27.359000 audit[2317]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2317 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:27.359000 audit[2317]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc36522420 a2=0 a3=7ffc3652240c items=0 ppid=2232 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.359000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 02:03:27.361000 audit[2319]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2319 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:27.361000 audit[2319]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdbcf5d050 a2=0 a3=7ffdbcf5d03c items=0 ppid=2232 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.361000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 02:03:27.364000 audit[2322]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2322 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:27.364000 audit[2322]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdfeb3be60 a2=0 a3=7ffdfeb3be4c items=0 ppid=2232 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.364000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 02:03:27.365000 audit[2323]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2323 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:27.365000 audit[2323]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffddfa78b00 a2=0 a3=7ffddfa78aec items=0 ppid=2232 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.365000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 02:03:27.367000 audit[2325]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2325 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:27.367000 audit[2325]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffe7220f50 a2=0 a3=7fffe7220f3c items=0 ppid=2232 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.367000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 02:03:27.368000 audit[2326]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2326 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:27.368000 audit[2326]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc8c1c7a00 a2=0 a3=7ffc8c1c79ec items=0 ppid=2232 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.368000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 02:03:27.370000 audit[2328]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2328 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:27.370000 audit[2328]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffddb841d0 a2=0 a3=7fffddb841bc items=0 ppid=2232 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.370000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 02:03:27.373000 audit[2331]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2331 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:27.373000 audit[2331]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffecdba2d80 a2=0 a3=7ffecdba2d6c items=0 ppid=2232 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.373000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 02:03:27.375000 audit[2334]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2334 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:27.375000 audit[2334]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd6e67e210 a2=0 a3=7ffd6e67e1fc items=0 ppid=2232 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.375000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 02:03:27.376000 audit[2335]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2335 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:27.376000 audit[2335]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffee947ad0 a2=0 a3=7fffee947abc items=0 ppid=2232 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.376000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 02:03:27.378000 audit[2337]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2337 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:27.378000 audit[2337]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffc01f9bd20 a2=0 a3=7ffc01f9bd0c items=0 ppid=2232 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.378000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:03:27.381000 audit[2340]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2340 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:27.381000 audit[2340]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff071f4000 a2=0 a3=7fff071f3fec items=0 ppid=2232 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.381000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:03:27.382000 audit[2341]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2341 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:27.382000 audit[2341]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe99490890 a2=0 a3=7ffe9949087c items=0 ppid=2232 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.382000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 02:03:27.384000 audit[2343]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2343 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:27.384000 audit[2343]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffd9cd690a0 a2=0 a3=7ffd9cd6908c items=0 ppid=2232 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.384000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 02:03:27.403000 audit[2349]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2349 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:03:27.403000 audit[2349]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffe743f6900 a2=0 a3=7ffe743f68ec items=0 ppid=2232 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.403000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:03:27.416000 audit[2349]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2349 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:03:27.416000 audit[2349]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffe743f6900 a2=0 a3=7ffe743f68ec items=0 ppid=2232 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.416000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:03:27.417000 audit[2355]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2355 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:27.417000 audit[2355]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe6a452940 a2=0 a3=7ffe6a45292c items=0 ppid=2232 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.417000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 02:03:27.421000 audit[2357]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2357 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:27.421000 audit[2357]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffda1d3e70 a2=0 a3=7fffda1d3e5c items=0 ppid=2232 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.421000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 02:03:27.424000 audit[2360]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2360 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:27.424000 audit[2360]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdb9f88c70 a2=0 a3=7ffdb9f88c5c items=0 ppid=2232 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.424000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 02:03:27.425000 audit[2361]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2361 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:27.425000 audit[2361]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcf8d91540 a2=0 a3=7ffcf8d9152c items=0 ppid=2232 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.425000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 02:03:27.427000 audit[2363]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2363 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:27.427000 audit[2363]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffed18cc080 a2=0 a3=7ffed18cc06c items=0 ppid=2232 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.427000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 02:03:27.428000 audit[2364]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2364 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:27.428000 audit[2364]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdca328940 a2=0 a3=7ffdca32892c items=0 ppid=2232 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.428000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 02:03:27.430000 audit[2366]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2366 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:27.430000 audit[2366]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffebad8c530 a2=0 a3=7ffebad8c51c items=0 ppid=2232 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.430000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 02:03:27.432000 audit[2369]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2369 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:27.432000 audit[2369]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffe9735e670 a2=0 a3=7ffe9735e65c items=0 ppid=2232 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.432000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 02:03:27.433000 audit[2370]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2370 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:27.433000 audit[2370]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdcea6cd20 a2=0 a3=7ffdcea6cd0c items=0 ppid=2232 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.433000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 02:03:27.435000 audit[2372]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2372 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:27.435000 audit[2372]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff0287efd0 a2=0 a3=7fff0287efbc items=0 ppid=2232 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.435000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 02:03:27.436000 audit[2373]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2373 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:27.436000 audit[2373]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffebaeafc50 a2=0 a3=7ffebaeafc3c items=0 ppid=2232 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.436000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 02:03:27.438000 audit[2375]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2375 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:27.438000 audit[2375]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffde7815f40 a2=0 a3=7ffde7815f2c items=0 ppid=2232 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.438000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 02:03:27.441000 audit[2378]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2378 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:27.441000 audit[2378]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc38b27a50 a2=0 a3=7ffc38b27a3c items=0 ppid=2232 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.441000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 02:03:27.444000 audit[2381]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2381 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:27.444000 audit[2381]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcd1143680 a2=0 a3=7ffcd114366c items=0 ppid=2232 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.444000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 02:03:27.444000 audit[2382]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2382 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:27.444000 audit[2382]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff6f271750 a2=0 a3=7fff6f27173c items=0 ppid=2232 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.444000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 02:03:27.446000 audit[2384]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2384 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:27.446000 audit[2384]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffda54b6c80 a2=0 a3=7ffda54b6c6c items=0 ppid=2232 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.446000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:03:27.449000 audit[2387]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2387 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:27.449000 audit[2387]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffec2c3fd30 a2=0 a3=7ffec2c3fd1c items=0 ppid=2232 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.449000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:03:27.449000 audit[2388]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2388 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:27.449000 audit[2388]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe4d36c0a0 a2=0 a3=7ffe4d36c08c items=0 ppid=2232 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.449000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 02:03:27.451000 audit[2390]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2390 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:27.451000 audit[2390]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffcb23de9e0 a2=0 a3=7ffcb23de9cc items=0 ppid=2232 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.451000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 02:03:27.452000 audit[2391]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2391 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:27.452000 audit[2391]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdb78acff0 a2=0 a3=7ffdb78acfdc items=0 ppid=2232 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.452000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 02:03:27.454000 audit[2393]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2393 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:27.454000 audit[2393]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd58ea1d70 a2=0 a3=7ffd58ea1d5c items=0 ppid=2232 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.454000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:03:27.457000 audit[2396]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2396 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:27.457000 audit[2396]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd5051e470 a2=0 a3=7ffd5051e45c items=0 ppid=2232 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.457000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:03:27.459000 audit[2398]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2398 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 02:03:27.459000 audit[2398]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffc80167000 a2=0 a3=7ffc80166fec items=0 ppid=2232 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.459000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:03:27.459000 audit[2398]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2398 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 02:03:27.459000 audit[2398]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffc80167000 a2=0 a3=7ffc80166fec items=0 ppid=2232 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:27.459000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:03:27.536291 kubelet[2056]: E1213 02:03:27.536260 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:27.536479 kubelet[2056]: E1213 02:03:27.536323 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:31.422572 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1991113967.mount: Deactivated successfully. Dec 13 02:03:32.375421 env[1212]: time="2024-12-13T02:03:32.375356091Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:32.432757 env[1212]: time="2024-12-13T02:03:32.432709601Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:32.464658 env[1212]: time="2024-12-13T02:03:32.464611222Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:32.500936 env[1212]: time="2024-12-13T02:03:32.500874967Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:32.501580 env[1212]: time="2024-12-13T02:03:32.501539540Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346\"" Dec 13 02:03:32.503694 env[1212]: time="2024-12-13T02:03:32.503665249Z" level=info msg="CreateContainer within sandbox \"e10f4c2e595cd08d5eab5b9876069ecde543f36ffafa6aafb083878560b15900\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Dec 13 02:03:32.517920 kubelet[2056]: I1213 02:03:32.517811 2056 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-x859l" podStartSLOduration=6.517788969 podStartE2EDuration="6.517788969s" podCreationTimestamp="2024-12-13 02:03:26 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:03:27.54453827 +0000 UTC m=+15.123223264" watchObservedRunningTime="2024-12-13 02:03:32.517788969 +0000 UTC m=+20.096473973" Dec 13 02:03:32.518380 env[1212]: time="2024-12-13T02:03:32.518252613Z" level=info msg="CreateContainer within sandbox \"e10f4c2e595cd08d5eab5b9876069ecde543f36ffafa6aafb083878560b15900\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"331e643a9730cfc2c0ce9f587665ab5dbe09de29d18b7a5e94d873b775878669\"" Dec 13 02:03:32.518756 env[1212]: time="2024-12-13T02:03:32.518735003Z" level=info msg="StartContainer for \"331e643a9730cfc2c0ce9f587665ab5dbe09de29d18b7a5e94d873b775878669\"" Dec 13 02:03:32.535339 systemd[1]: Started cri-containerd-331e643a9730cfc2c0ce9f587665ab5dbe09de29d18b7a5e94d873b775878669.scope. Dec 13 02:03:32.537232 systemd[1]: run-containerd-runc-k8s.io-331e643a9730cfc2c0ce9f587665ab5dbe09de29d18b7a5e94d873b775878669-runc.goA6Ge.mount: Deactivated successfully. Dec 13 02:03:32.551965 kernel: kauditd_printk_skb: 300 callbacks suppressed Dec 13 02:03:32.552147 kernel: audit: type=1400 audit(1734055412.547:898): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:32.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:32.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:32.555440 kernel: audit: type=1400 audit(1734055412.547:899): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:32.555568 kernel: audit: type=1400 audit(1734055412.547:900): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:32.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:32.558478 kernel: audit: type=1400 audit(1734055412.547:901): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:32.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:32.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:32.565006 kernel: audit: type=1400 audit(1734055412.547:902): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:32.565072 kernel: audit: type=1400 audit(1734055412.547:903): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:32.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:32.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:32.570932 kernel: audit: type=1400 audit(1734055412.547:904): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:32.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:32.574181 kernel: audit: type=1400 audit(1734055412.547:905): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:32.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:32.580097 kernel: audit: type=1400 audit(1734055412.547:906): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:32.580154 kernel: audit: type=1400 audit(1734055412.551:907): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:32.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:32.551000 audit: BPF prog-id=114 op=LOAD Dec 13 02:03:32.552000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:32.552000 audit[2406]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c7c48 a2=10 a3=1c items=0 ppid=2226 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:32.552000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333316536343361393733306366633263306365396635383736363561 Dec 13 02:03:32.552000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:32.552000 audit[2406]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c76b0 a2=3c a3=8 items=0 ppid=2226 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:32.552000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333316536343361393733306366633263306365396635383736363561 Dec 13 02:03:32.552000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:32.552000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:32.552000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:32.552000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:32.552000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:32.552000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:32.552000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:32.552000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:32.552000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:32.552000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:32.552000 audit: BPF prog-id=115 op=LOAD Dec 13 02:03:32.552000 audit[2406]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c79d8 a2=78 a3=c0002e7dc0 items=0 ppid=2226 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:32.552000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333316536343361393733306366633263306365396635383736363561 Dec 13 02:03:32.554000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:32.554000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:32.554000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:32.554000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:32.554000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:32.554000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:32.554000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:32.554000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:32.554000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:32.554000 audit: BPF prog-id=116 op=LOAD Dec 13 02:03:32.554000 audit[2406]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c7770 a2=78 a3=c0002e7e08 items=0 ppid=2226 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:32.554000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333316536343361393733306366633263306365396635383736363561 Dec 13 02:03:32.560000 audit: BPF prog-id=116 op=UNLOAD Dec 13 02:03:32.560000 audit: BPF prog-id=115 op=UNLOAD Dec 13 02:03:32.560000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:32.560000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:32.560000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:32.560000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:32.560000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:32.560000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:32.560000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:32.560000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:32.560000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:32.560000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:32.560000 audit: BPF prog-id=117 op=LOAD Dec 13 02:03:32.560000 audit[2406]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c7c30 a2=78 a3=c0003b6218 items=0 ppid=2226 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:32.560000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333316536343361393733306366633263306365396635383736363561 Dec 13 02:03:32.687188 env[1212]: time="2024-12-13T02:03:32.687112550Z" level=info msg="StartContainer for \"331e643a9730cfc2c0ce9f587665ab5dbe09de29d18b7a5e94d873b775878669\" returns successfully" Dec 13 02:03:33.556166 kubelet[2056]: I1213 02:03:33.556098 2056 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-7bc55997bb-slctj" podStartSLOduration=2.2747074879999998 podStartE2EDuration="7.556078641s" podCreationTimestamp="2024-12-13 02:03:26 +0000 UTC" firstStartedPulling="2024-12-13 02:03:27.221084875 +0000 UTC m=+14.799769869" lastFinishedPulling="2024-12-13 02:03:32.502456018 +0000 UTC m=+20.081141022" observedRunningTime="2024-12-13 02:03:33.555698255 +0000 UTC m=+21.134383259" watchObservedRunningTime="2024-12-13 02:03:33.556078641 +0000 UTC m=+21.134763645" Dec 13 02:03:35.330000 audit[2437]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2437 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:03:35.330000 audit[2437]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffc771e6320 a2=0 a3=7ffc771e630c items=0 ppid=2232 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:35.330000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:03:35.336000 audit[2437]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2437 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:03:35.336000 audit[2437]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc771e6320 a2=0 a3=0 items=0 ppid=2232 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:35.336000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:03:35.345000 audit[2439]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2439 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:03:35.345000 audit[2439]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffedeb48180 a2=0 a3=7ffedeb4816c items=0 ppid=2232 pid=2439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:35.345000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:03:35.353000 audit[2439]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2439 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:03:35.353000 audit[2439]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffedeb48180 a2=0 a3=0 items=0 ppid=2232 pid=2439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:35.353000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:03:35.456722 kubelet[2056]: I1213 02:03:35.456675 2056 topology_manager.go:215] "Topology Admit Handler" podUID="a0a3ee86-914e-48b3-9931-52b8ea789645" podNamespace="calico-system" podName="calico-typha-5855859db9-kqcqh" Dec 13 02:03:35.461859 systemd[1]: Created slice kubepods-besteffort-poda0a3ee86_914e_48b3_9931_52b8ea789645.slice. Dec 13 02:03:35.545333 kubelet[2056]: I1213 02:03:35.545287 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/a0a3ee86-914e-48b3-9931-52b8ea789645-tigera-ca-bundle\") pod \"calico-typha-5855859db9-kqcqh\" (UID: \"a0a3ee86-914e-48b3-9931-52b8ea789645\") " pod="calico-system/calico-typha-5855859db9-kqcqh" Dec 13 02:03:35.545569 kubelet[2056]: I1213 02:03:35.545377 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/a0a3ee86-914e-48b3-9931-52b8ea789645-typha-certs\") pod \"calico-typha-5855859db9-kqcqh\" (UID: \"a0a3ee86-914e-48b3-9931-52b8ea789645\") " pod="calico-system/calico-typha-5855859db9-kqcqh" Dec 13 02:03:35.545569 kubelet[2056]: I1213 02:03:35.545410 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-b662n\" (UniqueName: \"kubernetes.io/projected/a0a3ee86-914e-48b3-9931-52b8ea789645-kube-api-access-b662n\") pod \"calico-typha-5855859db9-kqcqh\" (UID: \"a0a3ee86-914e-48b3-9931-52b8ea789645\") " pod="calico-system/calico-typha-5855859db9-kqcqh" Dec 13 02:03:35.583279 kubelet[2056]: I1213 02:03:35.583159 2056 topology_manager.go:215] "Topology Admit Handler" podUID="04e3ddf1-c381-4589-a3c4-8b706b932cc5" podNamespace="calico-system" podName="calico-node-m42bx" Dec 13 02:03:35.585205 kubelet[2056]: W1213 02:03:35.585173 2056 reflector.go:547] object-"calico-system"/"node-certs": failed to list *v1.Secret: secrets "node-certs" is forbidden: User "system:node:localhost" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'localhost' and this object Dec 13 02:03:35.585205 kubelet[2056]: E1213 02:03:35.585205 2056 reflector.go:150] object-"calico-system"/"node-certs": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "node-certs" is forbidden: User "system:node:localhost" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'localhost' and this object Dec 13 02:03:35.585705 kubelet[2056]: W1213 02:03:35.585677 2056 reflector.go:547] object-"calico-system"/"cni-config": failed to list *v1.ConfigMap: configmaps "cni-config" is forbidden: User "system:node:localhost" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'localhost' and this object Dec 13 02:03:35.585705 kubelet[2056]: E1213 02:03:35.585698 2056 reflector.go:150] object-"calico-system"/"cni-config": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "cni-config" is forbidden: User "system:node:localhost" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'localhost' and this object Dec 13 02:03:35.588517 systemd[1]: Created slice kubepods-besteffort-pod04e3ddf1_c381_4589_a3c4_8b706b932cc5.slice. Dec 13 02:03:35.642431 kubelet[2056]: I1213 02:03:35.642389 2056 topology_manager.go:215] "Topology Admit Handler" podUID="6caefe76-fe04-44c0-b43e-81fd39cda0c9" podNamespace="calico-system" podName="csi-node-driver-wlj2f" Dec 13 02:03:35.642732 kubelet[2056]: E1213 02:03:35.642696 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wlj2f" podUID="6caefe76-fe04-44c0-b43e-81fd39cda0c9" Dec 13 02:03:35.646240 kubelet[2056]: I1213 02:03:35.646194 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/04e3ddf1-c381-4589-a3c4-8b706b932cc5-var-lib-calico\") pod \"calico-node-m42bx\" (UID: \"04e3ddf1-c381-4589-a3c4-8b706b932cc5\") " pod="calico-system/calico-node-m42bx" Dec 13 02:03:35.646240 kubelet[2056]: I1213 02:03:35.646223 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/04e3ddf1-c381-4589-a3c4-8b706b932cc5-cni-log-dir\") pod \"calico-node-m42bx\" (UID: \"04e3ddf1-c381-4589-a3c4-8b706b932cc5\") " pod="calico-system/calico-node-m42bx" Dec 13 02:03:35.646240 kubelet[2056]: I1213 02:03:35.646241 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/04e3ddf1-c381-4589-a3c4-8b706b932cc5-flexvol-driver-host\") pod \"calico-node-m42bx\" (UID: \"04e3ddf1-c381-4589-a3c4-8b706b932cc5\") " pod="calico-system/calico-node-m42bx" Dec 13 02:03:35.646474 kubelet[2056]: I1213 02:03:35.646260 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/04e3ddf1-c381-4589-a3c4-8b706b932cc5-node-certs\") pod \"calico-node-m42bx\" (UID: \"04e3ddf1-c381-4589-a3c4-8b706b932cc5\") " pod="calico-system/calico-node-m42bx" Dec 13 02:03:35.646474 kubelet[2056]: I1213 02:03:35.646274 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/04e3ddf1-c381-4589-a3c4-8b706b932cc5-var-run-calico\") pod \"calico-node-m42bx\" (UID: \"04e3ddf1-c381-4589-a3c4-8b706b932cc5\") " pod="calico-system/calico-node-m42bx" Dec 13 02:03:35.646474 kubelet[2056]: I1213 02:03:35.646287 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/04e3ddf1-c381-4589-a3c4-8b706b932cc5-policysync\") pod \"calico-node-m42bx\" (UID: \"04e3ddf1-c381-4589-a3c4-8b706b932cc5\") " pod="calico-system/calico-node-m42bx" Dec 13 02:03:35.646474 kubelet[2056]: I1213 02:03:35.646300 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/04e3ddf1-c381-4589-a3c4-8b706b932cc5-tigera-ca-bundle\") pod \"calico-node-m42bx\" (UID: \"04e3ddf1-c381-4589-a3c4-8b706b932cc5\") " pod="calico-system/calico-node-m42bx" Dec 13 02:03:35.646474 kubelet[2056]: I1213 02:03:35.646316 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gfb7l\" (UniqueName: \"kubernetes.io/projected/04e3ddf1-c381-4589-a3c4-8b706b932cc5-kube-api-access-gfb7l\") pod \"calico-node-m42bx\" (UID: \"04e3ddf1-c381-4589-a3c4-8b706b932cc5\") " pod="calico-system/calico-node-m42bx" Dec 13 02:03:35.646589 kubelet[2056]: I1213 02:03:35.646340 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/04e3ddf1-c381-4589-a3c4-8b706b932cc5-cni-net-dir\") pod \"calico-node-m42bx\" (UID: \"04e3ddf1-c381-4589-a3c4-8b706b932cc5\") " pod="calico-system/calico-node-m42bx" Dec 13 02:03:35.646589 kubelet[2056]: I1213 02:03:35.646353 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/04e3ddf1-c381-4589-a3c4-8b706b932cc5-lib-modules\") pod \"calico-node-m42bx\" (UID: \"04e3ddf1-c381-4589-a3c4-8b706b932cc5\") " pod="calico-system/calico-node-m42bx" Dec 13 02:03:35.646589 kubelet[2056]: I1213 02:03:35.646368 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/04e3ddf1-c381-4589-a3c4-8b706b932cc5-cni-bin-dir\") pod \"calico-node-m42bx\" (UID: \"04e3ddf1-c381-4589-a3c4-8b706b932cc5\") " pod="calico-system/calico-node-m42bx" Dec 13 02:03:35.646589 kubelet[2056]: I1213 02:03:35.646397 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/04e3ddf1-c381-4589-a3c4-8b706b932cc5-xtables-lock\") pod \"calico-node-m42bx\" (UID: \"04e3ddf1-c381-4589-a3c4-8b706b932cc5\") " pod="calico-system/calico-node-m42bx" Dec 13 02:03:35.747224 kubelet[2056]: I1213 02:03:35.747182 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/6caefe76-fe04-44c0-b43e-81fd39cda0c9-socket-dir\") pod \"csi-node-driver-wlj2f\" (UID: \"6caefe76-fe04-44c0-b43e-81fd39cda0c9\") " pod="calico-system/csi-node-driver-wlj2f" Dec 13 02:03:35.747224 kubelet[2056]: I1213 02:03:35.747228 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-s2k2p\" (UniqueName: \"kubernetes.io/projected/6caefe76-fe04-44c0-b43e-81fd39cda0c9-kube-api-access-s2k2p\") pod \"csi-node-driver-wlj2f\" (UID: \"6caefe76-fe04-44c0-b43e-81fd39cda0c9\") " pod="calico-system/csi-node-driver-wlj2f" Dec 13 02:03:35.747441 kubelet[2056]: I1213 02:03:35.747285 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/6caefe76-fe04-44c0-b43e-81fd39cda0c9-kubelet-dir\") pod \"csi-node-driver-wlj2f\" (UID: \"6caefe76-fe04-44c0-b43e-81fd39cda0c9\") " pod="calico-system/csi-node-driver-wlj2f" Dec 13 02:03:35.747441 kubelet[2056]: I1213 02:03:35.747314 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/6caefe76-fe04-44c0-b43e-81fd39cda0c9-varrun\") pod \"csi-node-driver-wlj2f\" (UID: \"6caefe76-fe04-44c0-b43e-81fd39cda0c9\") " pod="calico-system/csi-node-driver-wlj2f" Dec 13 02:03:35.747441 kubelet[2056]: I1213 02:03:35.747336 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/6caefe76-fe04-44c0-b43e-81fd39cda0c9-registration-dir\") pod \"csi-node-driver-wlj2f\" (UID: \"6caefe76-fe04-44c0-b43e-81fd39cda0c9\") " pod="calico-system/csi-node-driver-wlj2f" Dec 13 02:03:35.748999 kubelet[2056]: E1213 02:03:35.748949 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:35.748999 kubelet[2056]: W1213 02:03:35.748984 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:35.749177 kubelet[2056]: E1213 02:03:35.749010 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:35.756776 kubelet[2056]: E1213 02:03:35.756737 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:35.756776 kubelet[2056]: W1213 02:03:35.756760 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:35.756870 kubelet[2056]: E1213 02:03:35.756779 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:35.765512 kubelet[2056]: E1213 02:03:35.765466 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:35.766190 env[1212]: time="2024-12-13T02:03:35.766146866Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5855859db9-kqcqh,Uid:a0a3ee86-914e-48b3-9931-52b8ea789645,Namespace:calico-system,Attempt:0,}" Dec 13 02:03:35.787442 env[1212]: time="2024-12-13T02:03:35.787359816Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:03:35.787442 env[1212]: time="2024-12-13T02:03:35.787395633Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:03:35.787442 env[1212]: time="2024-12-13T02:03:35.787405952Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:03:35.788069 env[1212]: time="2024-12-13T02:03:35.788035758Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d88f68ebf40ae65a0eb5c67bb8ae61970d394c0f1be5ba773c9b970cc38746ce pid=2453 runtime=io.containerd.runc.v2 Dec 13 02:03:35.800162 systemd[1]: Started cri-containerd-d88f68ebf40ae65a0eb5c67bb8ae61970d394c0f1be5ba773c9b970cc38746ce.scope. Dec 13 02:03:35.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:35.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:35.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:35.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:35.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:35.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:35.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:35.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:35.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:35.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:35.810000 audit: BPF prog-id=118 op=LOAD Dec 13 02:03:35.810000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:35.810000 audit[2461]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=2453 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:35.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438386636386562663430616536356130656235633637626238616536 Dec 13 02:03:35.810000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:35.810000 audit[2461]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=2453 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:35.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438386636386562663430616536356130656235633637626238616536 Dec 13 02:03:35.810000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:35.810000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:35.810000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:35.810000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:35.810000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:35.810000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:35.810000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:35.810000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:35.810000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:35.810000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:35.810000 audit: BPF prog-id=119 op=LOAD Dec 13 02:03:35.810000 audit[2461]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c00025da20 items=0 ppid=2453 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:35.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438386636386562663430616536356130656235633637626238616536 Dec 13 02:03:35.810000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:35.810000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:35.810000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:35.810000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:35.810000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:35.810000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:35.810000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:35.810000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:35.810000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:35.810000 audit: BPF prog-id=120 op=LOAD Dec 13 02:03:35.810000 audit[2461]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c00025da68 items=0 ppid=2453 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:35.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438386636386562663430616536356130656235633637626238616536 Dec 13 02:03:35.810000 audit: BPF prog-id=120 op=UNLOAD Dec 13 02:03:35.810000 audit: BPF prog-id=119 op=UNLOAD Dec 13 02:03:35.810000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:35.810000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:35.810000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:35.810000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:35.810000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:35.810000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:35.810000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:35.810000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:35.810000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:35.810000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:35.810000 audit: BPF prog-id=121 op=LOAD Dec 13 02:03:35.810000 audit[2461]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c00025de78 items=0 ppid=2453 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:35.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438386636386562663430616536356130656235633637626238616536 Dec 13 02:03:35.832646 env[1212]: time="2024-12-13T02:03:35.832591860Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5855859db9-kqcqh,Uid:a0a3ee86-914e-48b3-9931-52b8ea789645,Namespace:calico-system,Attempt:0,} returns sandbox id \"d88f68ebf40ae65a0eb5c67bb8ae61970d394c0f1be5ba773c9b970cc38746ce\"" Dec 13 02:03:35.835938 kubelet[2056]: E1213 02:03:35.834414 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:35.837621 env[1212]: time="2024-12-13T02:03:35.837584164Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 02:03:35.848408 kubelet[2056]: E1213 02:03:35.848386 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:35.848408 kubelet[2056]: W1213 02:03:35.848405 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:35.848483 kubelet[2056]: E1213 02:03:35.848423 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:35.848623 kubelet[2056]: E1213 02:03:35.848608 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:35.848623 kubelet[2056]: W1213 02:03:35.848618 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:35.848694 kubelet[2056]: E1213 02:03:35.848635 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:35.848881 kubelet[2056]: E1213 02:03:35.848855 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:35.848881 kubelet[2056]: W1213 02:03:35.848878 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:35.848974 kubelet[2056]: E1213 02:03:35.848918 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:35.849117 kubelet[2056]: E1213 02:03:35.849101 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:35.849117 kubelet[2056]: W1213 02:03:35.849112 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:35.849217 kubelet[2056]: E1213 02:03:35.849128 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:35.849381 kubelet[2056]: E1213 02:03:35.849358 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:35.849381 kubelet[2056]: W1213 02:03:35.849371 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:35.849428 kubelet[2056]: E1213 02:03:35.849387 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:35.849612 kubelet[2056]: E1213 02:03:35.849599 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:35.849612 kubelet[2056]: W1213 02:03:35.849610 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:35.849658 kubelet[2056]: E1213 02:03:35.849625 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:35.849803 kubelet[2056]: E1213 02:03:35.849790 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:35.849803 kubelet[2056]: W1213 02:03:35.849801 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:35.849846 kubelet[2056]: E1213 02:03:35.849812 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:35.850056 kubelet[2056]: E1213 02:03:35.850040 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:35.850056 kubelet[2056]: W1213 02:03:35.850051 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:35.850130 kubelet[2056]: E1213 02:03:35.850089 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:35.850242 kubelet[2056]: E1213 02:03:35.850227 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:35.850242 kubelet[2056]: W1213 02:03:35.850238 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:35.850292 kubelet[2056]: E1213 02:03:35.850278 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:35.850444 kubelet[2056]: E1213 02:03:35.850431 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:35.850444 kubelet[2056]: W1213 02:03:35.850442 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:35.850493 kubelet[2056]: E1213 02:03:35.850457 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:35.850629 kubelet[2056]: E1213 02:03:35.850616 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:35.850629 kubelet[2056]: W1213 02:03:35.850627 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:35.850672 kubelet[2056]: E1213 02:03:35.850643 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:35.850814 kubelet[2056]: E1213 02:03:35.850802 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:35.850814 kubelet[2056]: W1213 02:03:35.850813 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:35.850862 kubelet[2056]: E1213 02:03:35.850827 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:35.851071 kubelet[2056]: E1213 02:03:35.851039 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:35.851071 kubelet[2056]: W1213 02:03:35.851050 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:35.851071 kubelet[2056]: E1213 02:03:35.851062 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:35.851237 kubelet[2056]: E1213 02:03:35.851223 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:35.851237 kubelet[2056]: W1213 02:03:35.851234 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:35.851284 kubelet[2056]: E1213 02:03:35.851248 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:35.851464 kubelet[2056]: E1213 02:03:35.851447 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:35.851464 kubelet[2056]: W1213 02:03:35.851459 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:35.851533 kubelet[2056]: E1213 02:03:35.851474 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:35.851657 kubelet[2056]: E1213 02:03:35.851644 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:35.851657 kubelet[2056]: W1213 02:03:35.851652 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:35.851710 kubelet[2056]: E1213 02:03:35.851673 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:35.851804 kubelet[2056]: E1213 02:03:35.851791 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:35.851804 kubelet[2056]: W1213 02:03:35.851801 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:35.851851 kubelet[2056]: E1213 02:03:35.851818 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:35.852006 kubelet[2056]: E1213 02:03:35.851993 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:35.852006 kubelet[2056]: W1213 02:03:35.852004 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:35.852064 kubelet[2056]: E1213 02:03:35.852018 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:35.852172 kubelet[2056]: E1213 02:03:35.852161 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:35.852172 kubelet[2056]: W1213 02:03:35.852170 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:35.852224 kubelet[2056]: E1213 02:03:35.852182 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:35.852341 kubelet[2056]: E1213 02:03:35.852330 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:35.852341 kubelet[2056]: W1213 02:03:35.852339 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:35.852392 kubelet[2056]: E1213 02:03:35.852350 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:35.852510 kubelet[2056]: E1213 02:03:35.852498 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:35.852510 kubelet[2056]: W1213 02:03:35.852508 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:35.852557 kubelet[2056]: E1213 02:03:35.852519 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:35.852669 kubelet[2056]: E1213 02:03:35.852655 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:35.852669 kubelet[2056]: W1213 02:03:35.852667 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:35.852720 kubelet[2056]: E1213 02:03:35.852677 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:35.852943 kubelet[2056]: E1213 02:03:35.852927 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:35.852943 kubelet[2056]: W1213 02:03:35.852938 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:35.853019 kubelet[2056]: E1213 02:03:35.852949 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:35.853145 kubelet[2056]: E1213 02:03:35.853130 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:35.853145 kubelet[2056]: W1213 02:03:35.853140 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:35.853145 kubelet[2056]: E1213 02:03:35.853147 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:35.853305 kubelet[2056]: E1213 02:03:35.853292 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:35.853331 kubelet[2056]: W1213 02:03:35.853310 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:35.853331 kubelet[2056]: E1213 02:03:35.853319 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:35.854475 kubelet[2056]: E1213 02:03:35.853636 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:35.854475 kubelet[2056]: W1213 02:03:35.853646 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:35.854475 kubelet[2056]: E1213 02:03:35.853654 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:35.860556 kubelet[2056]: E1213 02:03:35.860528 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:35.860556 kubelet[2056]: W1213 02:03:35.860540 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:35.860556 kubelet[2056]: E1213 02:03:35.860547 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:35.953378 kubelet[2056]: E1213 02:03:35.953330 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:35.953378 kubelet[2056]: W1213 02:03:35.953353 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:35.953378 kubelet[2056]: E1213 02:03:35.953371 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:36.054397 kubelet[2056]: E1213 02:03:36.054351 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:36.054397 kubelet[2056]: W1213 02:03:36.054376 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:36.054397 kubelet[2056]: E1213 02:03:36.054395 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:36.155755 kubelet[2056]: E1213 02:03:36.155666 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:36.155755 kubelet[2056]: W1213 02:03:36.155687 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:36.155755 kubelet[2056]: E1213 02:03:36.155707 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:36.256554 kubelet[2056]: E1213 02:03:36.256518 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:36.256554 kubelet[2056]: W1213 02:03:36.256538 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:36.256554 kubelet[2056]: E1213 02:03:36.256556 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:36.357297 kubelet[2056]: E1213 02:03:36.357259 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:36.357297 kubelet[2056]: W1213 02:03:36.357278 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:36.357297 kubelet[2056]: E1213 02:03:36.357296 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:36.367000 audit[2521]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2521 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:03:36.367000 audit[2521]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7fff70f9c690 a2=0 a3=7fff70f9c67c items=0 ppid=2232 pid=2521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:36.367000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:03:36.371000 audit[2521]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2521 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:03:36.371000 audit[2521]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff70f9c690 a2=0 a3=0 items=0 ppid=2232 pid=2521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:36.371000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:03:36.457976 kubelet[2056]: E1213 02:03:36.457938 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:36.457976 kubelet[2056]: W1213 02:03:36.457964 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:36.458326 kubelet[2056]: E1213 02:03:36.457982 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:36.558384 kubelet[2056]: E1213 02:03:36.558350 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:36.558384 kubelet[2056]: W1213 02:03:36.558369 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:36.558384 kubelet[2056]: E1213 02:03:36.558389 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:36.659059 kubelet[2056]: E1213 02:03:36.659026 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:36.659059 kubelet[2056]: W1213 02:03:36.659046 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:36.659059 kubelet[2056]: E1213 02:03:36.659063 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:36.748293 kubelet[2056]: E1213 02:03:36.748169 2056 secret.go:194] Couldn't get secret calico-system/node-certs: failed to sync secret cache: timed out waiting for the condition Dec 13 02:03:36.749428 kubelet[2056]: E1213 02:03:36.749392 2056 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/04e3ddf1-c381-4589-a3c4-8b706b932cc5-node-certs podName:04e3ddf1-c381-4589-a3c4-8b706b932cc5 nodeName:}" failed. No retries permitted until 2024-12-13 02:03:37.249359735 +0000 UTC m=+24.828044729 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "node-certs" (UniqueName: "kubernetes.io/secret/04e3ddf1-c381-4589-a3c4-8b706b932cc5-node-certs") pod "calico-node-m42bx" (UID: "04e3ddf1-c381-4589-a3c4-8b706b932cc5") : failed to sync secret cache: timed out waiting for the condition Dec 13 02:03:36.760523 kubelet[2056]: E1213 02:03:36.760495 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:36.760523 kubelet[2056]: W1213 02:03:36.760512 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:36.760607 kubelet[2056]: E1213 02:03:36.760529 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:36.861080 kubelet[2056]: E1213 02:03:36.861040 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:36.861080 kubelet[2056]: W1213 02:03:36.861062 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:36.861080 kubelet[2056]: E1213 02:03:36.861080 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:36.962297 kubelet[2056]: E1213 02:03:36.962262 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:36.962297 kubelet[2056]: W1213 02:03:36.962287 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:36.962297 kubelet[2056]: E1213 02:03:36.962305 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:37.063934 kubelet[2056]: E1213 02:03:37.063823 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:37.063934 kubelet[2056]: W1213 02:03:37.063849 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:37.063934 kubelet[2056]: E1213 02:03:37.063871 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:37.164811 kubelet[2056]: E1213 02:03:37.164779 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:37.164811 kubelet[2056]: W1213 02:03:37.164799 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:37.164811 kubelet[2056]: E1213 02:03:37.164815 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:37.265483 kubelet[2056]: E1213 02:03:37.265411 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:37.265483 kubelet[2056]: W1213 02:03:37.265472 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:37.265648 kubelet[2056]: E1213 02:03:37.265492 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:37.265860 kubelet[2056]: E1213 02:03:37.265839 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:37.265860 kubelet[2056]: W1213 02:03:37.265850 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:37.265860 kubelet[2056]: E1213 02:03:37.265859 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:37.266070 kubelet[2056]: E1213 02:03:37.266056 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:37.266070 kubelet[2056]: W1213 02:03:37.266067 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:37.266135 kubelet[2056]: E1213 02:03:37.266074 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:37.266231 kubelet[2056]: E1213 02:03:37.266216 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:37.266231 kubelet[2056]: W1213 02:03:37.266225 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:37.266231 kubelet[2056]: E1213 02:03:37.266231 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:37.266403 kubelet[2056]: E1213 02:03:37.266390 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:37.266403 kubelet[2056]: W1213 02:03:37.266401 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:37.266457 kubelet[2056]: E1213 02:03:37.266408 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:37.273698 kubelet[2056]: E1213 02:03:37.273680 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:37.273698 kubelet[2056]: W1213 02:03:37.273691 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:37.273698 kubelet[2056]: E1213 02:03:37.273700 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:37.392461 kubelet[2056]: E1213 02:03:37.391814 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:37.392569 env[1212]: time="2024-12-13T02:03:37.392333852Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-m42bx,Uid:04e3ddf1-c381-4589-a3c4-8b706b932cc5,Namespace:calico-system,Attempt:0,}" Dec 13 02:03:37.394548 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount663094877.mount: Deactivated successfully. Dec 13 02:03:37.431962 env[1212]: time="2024-12-13T02:03:37.431890986Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:03:37.432101 env[1212]: time="2024-12-13T02:03:37.431966268Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:03:37.432101 env[1212]: time="2024-12-13T02:03:37.431988480Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:03:37.432186 env[1212]: time="2024-12-13T02:03:37.432140776Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8f900e27b5bcd7be5fd14a58e7d23ca397e17cf5bc8caee39c50cbf3b5784f67 pid=2545 runtime=io.containerd.runc.v2 Dec 13 02:03:37.443748 systemd[1]: Started cri-containerd-8f900e27b5bcd7be5fd14a58e7d23ca397e17cf5bc8caee39c50cbf3b5784f67.scope. Dec 13 02:03:37.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:37.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:37.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:37.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:37.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:37.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:37.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:37.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:37.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:37.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:37.453000 audit: BPF prog-id=122 op=LOAD Dec 13 02:03:37.453000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:37.453000 audit[2555]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2545 pid=2555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:37.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866393030653237623562636437626535666431346135386537643233 Dec 13 02:03:37.453000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:37.453000 audit[2555]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2545 pid=2555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:37.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866393030653237623562636437626535666431346135386537643233 Dec 13 02:03:37.453000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:37.453000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:37.453000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:37.453000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:37.453000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:37.453000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:37.453000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:37.453000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:37.453000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:37.453000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:37.453000 audit: BPF prog-id=123 op=LOAD Dec 13 02:03:37.453000 audit[2555]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000283360 items=0 ppid=2545 pid=2555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:37.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866393030653237623562636437626535666431346135386537643233 Dec 13 02:03:37.453000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:37.453000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:37.453000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:37.453000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:37.453000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:37.453000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:37.453000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:37.453000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:37.453000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:37.453000 audit: BPF prog-id=124 op=LOAD Dec 13 02:03:37.453000 audit[2555]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002833a8 items=0 ppid=2545 pid=2555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:37.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866393030653237623562636437626535666431346135386537643233 Dec 13 02:03:37.453000 audit: BPF prog-id=124 op=UNLOAD Dec 13 02:03:37.453000 audit: BPF prog-id=123 op=UNLOAD Dec 13 02:03:37.453000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:37.453000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:37.453000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:37.453000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:37.453000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:37.453000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:37.453000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:37.453000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:37.453000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:37.453000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:37.453000 audit: BPF prog-id=125 op=LOAD Dec 13 02:03:37.453000 audit[2555]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002837b8 items=0 ppid=2545 pid=2555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:37.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866393030653237623562636437626535666431346135386537643233 Dec 13 02:03:37.465077 env[1212]: time="2024-12-13T02:03:37.465024286Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-m42bx,Uid:04e3ddf1-c381-4589-a3c4-8b706b932cc5,Namespace:calico-system,Attempt:0,} returns sandbox id \"8f900e27b5bcd7be5fd14a58e7d23ca397e17cf5bc8caee39c50cbf3b5784f67\"" Dec 13 02:03:37.465949 kubelet[2056]: E1213 02:03:37.465787 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:37.504957 kubelet[2056]: E1213 02:03:37.504876 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wlj2f" podUID="6caefe76-fe04-44c0-b43e-81fd39cda0c9" Dec 13 02:03:39.276040 env[1212]: time="2024-12-13T02:03:39.275976518Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:39.277999 env[1212]: time="2024-12-13T02:03:39.277948519Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:39.279478 env[1212]: time="2024-12-13T02:03:39.279447590Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:39.280863 env[1212]: time="2024-12-13T02:03:39.280807349Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:39.281390 env[1212]: time="2024-12-13T02:03:39.281355972Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\"" Dec 13 02:03:39.282837 env[1212]: time="2024-12-13T02:03:39.282809677Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 02:03:39.292512 env[1212]: time="2024-12-13T02:03:39.292463985Z" level=info msg="CreateContainer within sandbox \"d88f68ebf40ae65a0eb5c67bb8ae61970d394c0f1be5ba773c9b970cc38746ce\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 02:03:39.307625 env[1212]: time="2024-12-13T02:03:39.307567366Z" level=info msg="CreateContainer within sandbox \"d88f68ebf40ae65a0eb5c67bb8ae61970d394c0f1be5ba773c9b970cc38746ce\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"02a257047f8c2a96b859f7266e1b0a7e6a0e67f3c98f4e49355799b944b8c761\"" Dec 13 02:03:39.308084 env[1212]: time="2024-12-13T02:03:39.308050957Z" level=info msg="StartContainer for \"02a257047f8c2a96b859f7266e1b0a7e6a0e67f3c98f4e49355799b944b8c761\"" Dec 13 02:03:39.324065 systemd[1]: Started cri-containerd-02a257047f8c2a96b859f7266e1b0a7e6a0e67f3c98f4e49355799b944b8c761.scope. Dec 13 02:03:39.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:39.334703 kernel: kauditd_printk_skb: 179 callbacks suppressed Dec 13 02:03:39.334767 kernel: audit: type=1400 audit(1734055419.332:958): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:39.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:39.341090 kernel: audit: type=1400 audit(1734055419.332:959): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:39.341142 kernel: audit: type=1400 audit(1734055419.332:960): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:39.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:39.344198 kernel: audit: type=1400 audit(1734055419.332:961): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:39.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:39.347401 kernel: audit: type=1400 audit(1734055419.332:962): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:39.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:39.350602 kernel: audit: type=1400 audit(1734055419.332:963): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:39.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:39.353785 kernel: audit: type=1400 audit(1734055419.332:964): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:39.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:39.357028 kernel: audit: type=1400 audit(1734055419.332:965): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:39.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:39.360487 kernel: audit: type=1400 audit(1734055419.332:966): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:39.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:39.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:39.366810 kernel: audit: type=1400 audit(1734055419.337:967): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:39.337000 audit: BPF prog-id=126 op=LOAD Dec 13 02:03:39.337000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:39.337000 audit[2588]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2453 pid=2588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:39.337000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032613235373034376638633261393662383539663732363665316230 Dec 13 02:03:39.337000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:39.337000 audit[2588]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2453 pid=2588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:39.337000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032613235373034376638633261393662383539663732363665316230 Dec 13 02:03:39.337000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:39.337000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:39.337000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:39.337000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:39.337000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:39.337000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:39.337000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:39.337000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:39.337000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:39.337000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:39.337000 audit: BPF prog-id=127 op=LOAD Dec 13 02:03:39.337000 audit[2588]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003b2b90 items=0 ppid=2453 pid=2588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:39.337000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032613235373034376638633261393662383539663732363665316230 Dec 13 02:03:39.343000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:39.343000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:39.343000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:39.343000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:39.343000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:39.343000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:39.343000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:39.343000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:39.343000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:39.343000 audit: BPF prog-id=128 op=LOAD Dec 13 02:03:39.343000 audit[2588]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003b2bd8 items=0 ppid=2453 pid=2588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:39.343000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032613235373034376638633261393662383539663732363665316230 Dec 13 02:03:39.346000 audit: BPF prog-id=128 op=UNLOAD Dec 13 02:03:39.346000 audit: BPF prog-id=127 op=UNLOAD Dec 13 02:03:39.346000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:39.346000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:39.346000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:39.346000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:39.346000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:39.346000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:39.346000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:39.346000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:39.346000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:39.346000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:39.346000 audit: BPF prog-id=129 op=LOAD Dec 13 02:03:39.346000 audit[2588]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003b2fe8 items=0 ppid=2453 pid=2588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:39.346000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032613235373034376638633261393662383539663732363665316230 Dec 13 02:03:39.390123 env[1212]: time="2024-12-13T02:03:39.390078738Z" level=info msg="StartContainer for \"02a257047f8c2a96b859f7266e1b0a7e6a0e67f3c98f4e49355799b944b8c761\" returns successfully" Dec 13 02:03:39.504851 kubelet[2056]: E1213 02:03:39.504770 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wlj2f" podUID="6caefe76-fe04-44c0-b43e-81fd39cda0c9" Dec 13 02:03:39.555796 kubelet[2056]: E1213 02:03:39.555684 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:39.571912 kubelet[2056]: E1213 02:03:39.571858 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:39.571912 kubelet[2056]: W1213 02:03:39.571874 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:39.571912 kubelet[2056]: E1213 02:03:39.571910 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:39.572134 kubelet[2056]: E1213 02:03:39.572124 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:39.572134 kubelet[2056]: W1213 02:03:39.572131 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:39.572203 kubelet[2056]: E1213 02:03:39.572138 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:39.572276 kubelet[2056]: E1213 02:03:39.572265 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:39.572276 kubelet[2056]: W1213 02:03:39.572276 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:39.572349 kubelet[2056]: E1213 02:03:39.572283 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:39.572411 kubelet[2056]: E1213 02:03:39.572402 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:39.572411 kubelet[2056]: W1213 02:03:39.572410 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:39.572472 kubelet[2056]: E1213 02:03:39.572415 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:39.572550 kubelet[2056]: E1213 02:03:39.572542 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:39.572550 kubelet[2056]: W1213 02:03:39.572549 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:39.572613 kubelet[2056]: E1213 02:03:39.572555 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:39.572696 kubelet[2056]: E1213 02:03:39.572673 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:39.572696 kubelet[2056]: W1213 02:03:39.572682 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:39.572696 kubelet[2056]: E1213 02:03:39.572688 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:39.572925 kubelet[2056]: E1213 02:03:39.572820 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:39.572925 kubelet[2056]: W1213 02:03:39.572828 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:39.572925 kubelet[2056]: E1213 02:03:39.572834 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:39.573150 kubelet[2056]: E1213 02:03:39.572971 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:39.573150 kubelet[2056]: W1213 02:03:39.572976 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:39.573150 kubelet[2056]: E1213 02:03:39.572982 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:39.573150 kubelet[2056]: E1213 02:03:39.573115 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:39.573150 kubelet[2056]: W1213 02:03:39.573121 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:39.573150 kubelet[2056]: E1213 02:03:39.573127 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:39.573295 kubelet[2056]: E1213 02:03:39.573228 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:39.573295 kubelet[2056]: W1213 02:03:39.573234 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:39.573295 kubelet[2056]: E1213 02:03:39.573239 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:39.573359 kubelet[2056]: E1213 02:03:39.573343 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:39.573359 kubelet[2056]: W1213 02:03:39.573348 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:39.573359 kubelet[2056]: E1213 02:03:39.573354 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:39.573469 kubelet[2056]: E1213 02:03:39.573456 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:39.573469 kubelet[2056]: W1213 02:03:39.573465 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:39.573519 kubelet[2056]: E1213 02:03:39.573470 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:39.573589 kubelet[2056]: E1213 02:03:39.573578 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:39.573589 kubelet[2056]: W1213 02:03:39.573586 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:39.573638 kubelet[2056]: E1213 02:03:39.573593 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:39.573706 kubelet[2056]: E1213 02:03:39.573695 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:39.573706 kubelet[2056]: W1213 02:03:39.573704 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:39.573756 kubelet[2056]: E1213 02:03:39.573710 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:39.573815 kubelet[2056]: E1213 02:03:39.573804 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:39.573855 kubelet[2056]: W1213 02:03:39.573818 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:39.573855 kubelet[2056]: E1213 02:03:39.573826 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:39.580159 kubelet[2056]: E1213 02:03:39.580136 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:39.580159 kubelet[2056]: W1213 02:03:39.580151 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:39.580232 kubelet[2056]: E1213 02:03:39.580161 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:39.580342 kubelet[2056]: E1213 02:03:39.580316 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:39.580342 kubelet[2056]: W1213 02:03:39.580338 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:39.580445 kubelet[2056]: E1213 02:03:39.580351 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:39.580546 kubelet[2056]: E1213 02:03:39.580532 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:39.580546 kubelet[2056]: W1213 02:03:39.580544 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:39.580629 kubelet[2056]: E1213 02:03:39.580558 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:39.580724 kubelet[2056]: E1213 02:03:39.580710 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:39.580724 kubelet[2056]: W1213 02:03:39.580721 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:39.580793 kubelet[2056]: E1213 02:03:39.580735 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:39.581056 kubelet[2056]: E1213 02:03:39.581019 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:39.581056 kubelet[2056]: W1213 02:03:39.581050 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:39.581115 kubelet[2056]: E1213 02:03:39.581074 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:39.581261 kubelet[2056]: E1213 02:03:39.581246 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:39.581261 kubelet[2056]: W1213 02:03:39.581255 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:39.581335 kubelet[2056]: E1213 02:03:39.581267 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:39.581422 kubelet[2056]: E1213 02:03:39.581409 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:39.581422 kubelet[2056]: W1213 02:03:39.581417 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:39.581473 kubelet[2056]: E1213 02:03:39.581428 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:39.581565 kubelet[2056]: E1213 02:03:39.581552 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:39.581588 kubelet[2056]: W1213 02:03:39.581565 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:39.581588 kubelet[2056]: E1213 02:03:39.581580 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:39.581715 kubelet[2056]: E1213 02:03:39.581706 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:39.581758 kubelet[2056]: W1213 02:03:39.581722 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:39.581758 kubelet[2056]: E1213 02:03:39.581732 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:39.581866 kubelet[2056]: E1213 02:03:39.581856 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:39.581866 kubelet[2056]: W1213 02:03:39.581863 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:39.581938 kubelet[2056]: E1213 02:03:39.581873 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:39.582026 kubelet[2056]: E1213 02:03:39.582018 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:39.582054 kubelet[2056]: W1213 02:03:39.582025 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:39.582078 kubelet[2056]: E1213 02:03:39.582051 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:39.582145 kubelet[2056]: E1213 02:03:39.582135 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:39.582172 kubelet[2056]: W1213 02:03:39.582144 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:39.582195 kubelet[2056]: E1213 02:03:39.582165 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:39.582280 kubelet[2056]: E1213 02:03:39.582267 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:39.582280 kubelet[2056]: W1213 02:03:39.582277 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:39.582328 kubelet[2056]: E1213 02:03:39.582293 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:39.582489 kubelet[2056]: E1213 02:03:39.582476 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:39.582489 kubelet[2056]: W1213 02:03:39.582488 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:39.582559 kubelet[2056]: E1213 02:03:39.582500 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:39.582664 kubelet[2056]: E1213 02:03:39.582648 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:39.582664 kubelet[2056]: W1213 02:03:39.582659 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:39.582735 kubelet[2056]: E1213 02:03:39.582674 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:39.582821 kubelet[2056]: E1213 02:03:39.582807 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:39.582821 kubelet[2056]: W1213 02:03:39.582819 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:39.582909 kubelet[2056]: E1213 02:03:39.582834 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:39.583006 kubelet[2056]: E1213 02:03:39.582993 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:39.583006 kubelet[2056]: W1213 02:03:39.583003 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:39.583078 kubelet[2056]: E1213 02:03:39.583016 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:39.583217 kubelet[2056]: E1213 02:03:39.583201 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:39.583217 kubelet[2056]: W1213 02:03:39.583213 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:39.583277 kubelet[2056]: E1213 02:03:39.583222 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:40.556633 kubelet[2056]: I1213 02:03:40.556599 2056 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 02:03:40.557336 kubelet[2056]: E1213 02:03:40.557237 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:40.580715 kubelet[2056]: E1213 02:03:40.580675 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:40.580715 kubelet[2056]: W1213 02:03:40.580698 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:40.580954 kubelet[2056]: E1213 02:03:40.580722 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:40.581092 kubelet[2056]: E1213 02:03:40.581074 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:40.581152 kubelet[2056]: W1213 02:03:40.581092 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:40.581152 kubelet[2056]: E1213 02:03:40.581107 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:40.581300 kubelet[2056]: E1213 02:03:40.581276 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:40.581300 kubelet[2056]: W1213 02:03:40.581297 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:40.581385 kubelet[2056]: E1213 02:03:40.581307 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:40.581477 kubelet[2056]: E1213 02:03:40.581462 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:40.581477 kubelet[2056]: W1213 02:03:40.581473 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:40.581579 kubelet[2056]: E1213 02:03:40.581488 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:40.581669 kubelet[2056]: E1213 02:03:40.581656 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:40.581669 kubelet[2056]: W1213 02:03:40.581666 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:40.581747 kubelet[2056]: E1213 02:03:40.581687 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:40.581860 kubelet[2056]: E1213 02:03:40.581848 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:40.581860 kubelet[2056]: W1213 02:03:40.581858 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:40.581972 kubelet[2056]: E1213 02:03:40.581876 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:40.582064 kubelet[2056]: E1213 02:03:40.582041 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:40.582064 kubelet[2056]: W1213 02:03:40.582061 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:40.582145 kubelet[2056]: E1213 02:03:40.582071 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:40.582254 kubelet[2056]: E1213 02:03:40.582240 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:40.582254 kubelet[2056]: W1213 02:03:40.582254 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:40.582347 kubelet[2056]: E1213 02:03:40.582266 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:40.582451 kubelet[2056]: E1213 02:03:40.582439 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:40.582490 kubelet[2056]: W1213 02:03:40.582449 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:40.582490 kubelet[2056]: E1213 02:03:40.582470 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:40.582644 kubelet[2056]: E1213 02:03:40.582630 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:40.582644 kubelet[2056]: W1213 02:03:40.582640 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:40.582745 kubelet[2056]: E1213 02:03:40.582649 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:40.582824 kubelet[2056]: E1213 02:03:40.582808 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:40.582907 kubelet[2056]: W1213 02:03:40.582822 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:40.582907 kubelet[2056]: E1213 02:03:40.582837 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:40.583057 kubelet[2056]: E1213 02:03:40.583041 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:40.583145 kubelet[2056]: W1213 02:03:40.583056 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:40.583145 kubelet[2056]: E1213 02:03:40.583071 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:40.583251 kubelet[2056]: E1213 02:03:40.583237 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:40.583251 kubelet[2056]: W1213 02:03:40.583249 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:40.583325 kubelet[2056]: E1213 02:03:40.583259 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:40.583465 kubelet[2056]: E1213 02:03:40.583441 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:40.583465 kubelet[2056]: W1213 02:03:40.583452 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:40.583465 kubelet[2056]: E1213 02:03:40.583462 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:40.583634 kubelet[2056]: E1213 02:03:40.583618 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:40.583634 kubelet[2056]: W1213 02:03:40.583629 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:40.583727 kubelet[2056]: E1213 02:03:40.583645 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:40.588252 kubelet[2056]: E1213 02:03:40.588209 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:40.588252 kubelet[2056]: W1213 02:03:40.588240 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:40.588406 kubelet[2056]: E1213 02:03:40.588264 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:40.588541 kubelet[2056]: E1213 02:03:40.588519 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:40.588617 kubelet[2056]: W1213 02:03:40.588538 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:40.588617 kubelet[2056]: E1213 02:03:40.588562 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:40.588802 kubelet[2056]: E1213 02:03:40.588790 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:40.588802 kubelet[2056]: W1213 02:03:40.588801 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:40.588926 kubelet[2056]: E1213 02:03:40.588814 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:40.589044 kubelet[2056]: E1213 02:03:40.589031 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:40.589083 kubelet[2056]: W1213 02:03:40.589044 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:40.589083 kubelet[2056]: E1213 02:03:40.589056 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:40.589240 kubelet[2056]: E1213 02:03:40.589213 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:40.589240 kubelet[2056]: W1213 02:03:40.589229 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:40.589328 kubelet[2056]: E1213 02:03:40.589243 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:40.589418 kubelet[2056]: E1213 02:03:40.589401 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:40.589471 kubelet[2056]: W1213 02:03:40.589416 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:40.589471 kubelet[2056]: E1213 02:03:40.589438 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:40.589628 kubelet[2056]: E1213 02:03:40.589611 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:40.589628 kubelet[2056]: W1213 02:03:40.589626 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:40.589723 kubelet[2056]: E1213 02:03:40.589655 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:40.589834 kubelet[2056]: E1213 02:03:40.589806 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:40.589834 kubelet[2056]: W1213 02:03:40.589819 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:40.590079 kubelet[2056]: E1213 02:03:40.589849 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:40.590079 kubelet[2056]: E1213 02:03:40.590000 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:40.590079 kubelet[2056]: W1213 02:03:40.590009 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:40.590079 kubelet[2056]: E1213 02:03:40.590059 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:40.590306 kubelet[2056]: E1213 02:03:40.590284 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:40.590306 kubelet[2056]: W1213 02:03:40.590297 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:40.590427 kubelet[2056]: E1213 02:03:40.590318 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:40.590488 kubelet[2056]: E1213 02:03:40.590475 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:40.590488 kubelet[2056]: W1213 02:03:40.590487 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:40.590560 kubelet[2056]: E1213 02:03:40.590503 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:40.590713 kubelet[2056]: E1213 02:03:40.590694 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:40.590713 kubelet[2056]: W1213 02:03:40.590708 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:40.590795 kubelet[2056]: E1213 02:03:40.590727 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:40.590995 kubelet[2056]: E1213 02:03:40.590980 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:40.590995 kubelet[2056]: W1213 02:03:40.590992 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:40.591081 kubelet[2056]: E1213 02:03:40.591002 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:40.591231 kubelet[2056]: E1213 02:03:40.591148 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:40.591231 kubelet[2056]: W1213 02:03:40.591157 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:40.591231 kubelet[2056]: E1213 02:03:40.591170 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:40.591345 kubelet[2056]: E1213 02:03:40.591331 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:40.591345 kubelet[2056]: W1213 02:03:40.591340 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:40.591345 kubelet[2056]: E1213 02:03:40.591347 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:40.591512 kubelet[2056]: E1213 02:03:40.591487 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:40.591512 kubelet[2056]: W1213 02:03:40.591506 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:40.591512 kubelet[2056]: E1213 02:03:40.591512 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:40.591690 kubelet[2056]: E1213 02:03:40.591675 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:40.591690 kubelet[2056]: W1213 02:03:40.591684 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:40.591690 kubelet[2056]: E1213 02:03:40.591691 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:40.592010 kubelet[2056]: E1213 02:03:40.591999 2056 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:03:40.592010 kubelet[2056]: W1213 02:03:40.592008 2056 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:03:40.592072 kubelet[2056]: E1213 02:03:40.592016 2056 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:03:41.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.89:22-10.0.0.1:57352 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:41.346215 systemd[1]: Started sshd@7-10.0.0.89:22-10.0.0.1:57352.service. Dec 13 02:03:41.384093 env[1212]: time="2024-12-13T02:03:41.384045047Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:41.383000 audit[2689]: USER_ACCT pid=2689 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:41.384720 sshd[2689]: Accepted publickey for core from 10.0.0.1 port 57352 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:03:41.384000 audit[2689]: CRED_ACQ pid=2689 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:41.384000 audit[2689]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc6513fe00 a2=3 a3=0 items=0 ppid=1 pid=2689 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:41.384000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:03:41.385993 sshd[2689]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:03:41.386477 env[1212]: time="2024-12-13T02:03:41.386453187Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:41.388210 env[1212]: time="2024-12-13T02:03:41.388175265Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:41.389556 systemd-logind[1199]: New session 8 of user core. Dec 13 02:03:41.390245 env[1212]: time="2024-12-13T02:03:41.390218028Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:41.390324 systemd[1]: Started session-8.scope. Dec 13 02:03:41.390653 env[1212]: time="2024-12-13T02:03:41.390517903Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 02:03:41.392542 env[1212]: time="2024-12-13T02:03:41.392514748Z" level=info msg="CreateContainer within sandbox \"8f900e27b5bcd7be5fd14a58e7d23ca397e17cf5bc8caee39c50cbf3b5784f67\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 02:03:41.395000 audit[2689]: USER_START pid=2689 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:41.396000 audit[2691]: CRED_ACQ pid=2691 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:41.410097 env[1212]: time="2024-12-13T02:03:41.410062627Z" level=info msg="CreateContainer within sandbox \"8f900e27b5bcd7be5fd14a58e7d23ca397e17cf5bc8caee39c50cbf3b5784f67\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"ee8e960a1cdb1c829d2a8d76d8f925a3d3e22eef72e170de52bfeb15997276c9\"" Dec 13 02:03:41.410553 env[1212]: time="2024-12-13T02:03:41.410524556Z" level=info msg="StartContainer for \"ee8e960a1cdb1c829d2a8d76d8f925a3d3e22eef72e170de52bfeb15997276c9\"" Dec 13 02:03:41.427976 systemd[1]: Started cri-containerd-ee8e960a1cdb1c829d2a8d76d8f925a3d3e22eef72e170de52bfeb15997276c9.scope. Dec 13 02:03:41.437000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:41.437000 audit[2699]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=7f404cd8a9b8 items=0 ppid=2545 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:41.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565386539363061316364623163383239643261386437366438663932 Dec 13 02:03:41.437000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:41.437000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:41.437000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:41.437000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:41.437000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:41.437000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:41.437000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:41.437000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:41.437000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:41.437000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:41.437000 audit: BPF prog-id=130 op=LOAD Dec 13 02:03:41.437000 audit[2699]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c59d8 a2=78 a3=c000380248 items=0 ppid=2545 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:41.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565386539363061316364623163383239643261386437366438663932 Dec 13 02:03:41.437000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:41.437000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:41.437000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:41.437000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:41.437000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:41.437000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:41.437000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:41.437000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:41.437000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:41.437000 audit: BPF prog-id=131 op=LOAD Dec 13 02:03:41.437000 audit[2699]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001c5770 a2=78 a3=c000380298 items=0 ppid=2545 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:41.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565386539363061316364623163383239643261386437366438663932 Dec 13 02:03:41.437000 audit: BPF prog-id=131 op=UNLOAD Dec 13 02:03:41.437000 audit: BPF prog-id=130 op=UNLOAD Dec 13 02:03:41.437000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:41.437000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:41.437000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:41.437000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:41.437000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:41.437000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:41.437000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:41.437000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:41.437000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:41.437000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:41.437000 audit: BPF prog-id=132 op=LOAD Dec 13 02:03:41.437000 audit[2699]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c5c30 a2=78 a3=c000380328 items=0 ppid=2545 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:41.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565386539363061316364623163383239643261386437366438663932 Dec 13 02:03:41.460757 systemd[1]: cri-containerd-ee8e960a1cdb1c829d2a8d76d8f925a3d3e22eef72e170de52bfeb15997276c9.scope: Deactivated successfully. Dec 13 02:03:41.464000 audit: BPF prog-id=132 op=UNLOAD Dec 13 02:03:41.474984 env[1212]: time="2024-12-13T02:03:41.474937368Z" level=info msg="StartContainer for \"ee8e960a1cdb1c829d2a8d76d8f925a3d3e22eef72e170de52bfeb15997276c9\" returns successfully" Dec 13 02:03:41.493784 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ee8e960a1cdb1c829d2a8d76d8f925a3d3e22eef72e170de52bfeb15997276c9-rootfs.mount: Deactivated successfully. Dec 13 02:03:41.504303 kubelet[2056]: E1213 02:03:41.504262 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wlj2f" podUID="6caefe76-fe04-44c0-b43e-81fd39cda0c9" Dec 13 02:03:41.517059 sshd[2689]: pam_unix(sshd:session): session closed for user core Dec 13 02:03:41.516000 audit[2689]: USER_END pid=2689 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:41.517000 audit[2689]: CRED_DISP pid=2689 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:41.518951 systemd[1]: sshd@7-10.0.0.89:22-10.0.0.1:57352.service: Deactivated successfully. Dec 13 02:03:41.518000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.89:22-10.0.0.1:57352 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:41.519565 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 02:03:41.520047 systemd-logind[1199]: Session 8 logged out. Waiting for processes to exit. Dec 13 02:03:41.520726 systemd-logind[1199]: Removed session 8. Dec 13 02:03:41.559422 kubelet[2056]: E1213 02:03:41.559390 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:41.572439 kubelet[2056]: I1213 02:03:41.572384 2056 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-5855859db9-kqcqh" podStartSLOduration=3.125669029 podStartE2EDuration="6.57236882s" podCreationTimestamp="2024-12-13 02:03:35 +0000 UTC" firstStartedPulling="2024-12-13 02:03:35.835419155 +0000 UTC m=+23.414104160" lastFinishedPulling="2024-12-13 02:03:39.282118947 +0000 UTC m=+26.860803951" observedRunningTime="2024-12-13 02:03:39.589770942 +0000 UTC m=+27.168455936" watchObservedRunningTime="2024-12-13 02:03:41.57236882 +0000 UTC m=+29.151053824" Dec 13 02:03:41.573129 env[1212]: time="2024-12-13T02:03:41.573055041Z" level=info msg="shim disconnected" id=ee8e960a1cdb1c829d2a8d76d8f925a3d3e22eef72e170de52bfeb15997276c9 Dec 13 02:03:41.573129 env[1212]: time="2024-12-13T02:03:41.573112550Z" level=warning msg="cleaning up after shim disconnected" id=ee8e960a1cdb1c829d2a8d76d8f925a3d3e22eef72e170de52bfeb15997276c9 namespace=k8s.io Dec 13 02:03:41.573129 env[1212]: time="2024-12-13T02:03:41.573125845Z" level=info msg="cleaning up dead shim" Dec 13 02:03:41.579753 env[1212]: time="2024-12-13T02:03:41.579718636Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:03:41Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2749 runtime=io.containerd.runc.v2\n" Dec 13 02:03:42.561495 kubelet[2056]: E1213 02:03:42.561462 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:42.562072 env[1212]: time="2024-12-13T02:03:42.562032313Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 02:03:43.504539 kubelet[2056]: E1213 02:03:43.504492 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wlj2f" podUID="6caefe76-fe04-44c0-b43e-81fd39cda0c9" Dec 13 02:03:45.504604 kubelet[2056]: E1213 02:03:45.504553 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wlj2f" podUID="6caefe76-fe04-44c0-b43e-81fd39cda0c9" Dec 13 02:03:46.520960 systemd[1]: Started sshd@8-10.0.0.89:22-10.0.0.1:47264.service. Dec 13 02:03:46.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.89:22-10.0.0.1:47264 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:46.525921 kernel: kauditd_printk_skb: 102 callbacks suppressed Dec 13 02:03:46.526040 kernel: audit: type=1130 audit(1734055426.520:992): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.89:22-10.0.0.1:47264 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:46.561000 audit[2768]: USER_ACCT pid=2768 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:46.562137 sshd[2768]: Accepted publickey for core from 10.0.0.1 port 47264 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:03:46.564339 sshd[2768]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:03:46.562000 audit[2768]: CRED_ACQ pid=2768 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:46.568371 systemd-logind[1199]: New session 9 of user core. Dec 13 02:03:46.569344 systemd[1]: Started session-9.scope. Dec 13 02:03:46.571923 kernel: audit: type=1101 audit(1734055426.561:993): pid=2768 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:46.571981 kernel: audit: type=1103 audit(1734055426.562:994): pid=2768 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:46.572011 kernel: audit: type=1006 audit(1734055426.563:995): pid=2768 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Dec 13 02:03:46.563000 audit[2768]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce6b73e60 a2=3 a3=0 items=0 ppid=1 pid=2768 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:46.579391 kernel: audit: type=1300 audit(1734055426.563:995): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce6b73e60 a2=3 a3=0 items=0 ppid=1 pid=2768 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:46.579441 kernel: audit: type=1327 audit(1734055426.563:995): proctitle=737368643A20636F7265205B707269765D Dec 13 02:03:46.563000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:03:46.580845 kernel: audit: type=1105 audit(1734055426.573:996): pid=2768 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:46.573000 audit[2768]: USER_START pid=2768 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:46.574000 audit[2770]: CRED_ACQ pid=2770 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:46.589239 kernel: audit: type=1103 audit(1734055426.574:997): pid=2770 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:46.675587 sshd[2768]: pam_unix(sshd:session): session closed for user core Dec 13 02:03:46.675000 audit[2768]: USER_END pid=2768 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:46.677724 systemd[1]: sshd@8-10.0.0.89:22-10.0.0.1:47264.service: Deactivated successfully. Dec 13 02:03:46.678348 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 02:03:46.679182 systemd-logind[1199]: Session 9 logged out. Waiting for processes to exit. Dec 13 02:03:46.679856 systemd-logind[1199]: Removed session 9. Dec 13 02:03:46.675000 audit[2768]: CRED_DISP pid=2768 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:46.686049 kernel: audit: type=1106 audit(1734055426.675:998): pid=2768 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:46.686110 kernel: audit: type=1104 audit(1734055426.675:999): pid=2768 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:46.675000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.89:22-10.0.0.1:47264 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:47.504861 kubelet[2056]: E1213 02:03:47.504760 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wlj2f" podUID="6caefe76-fe04-44c0-b43e-81fd39cda0c9" Dec 13 02:03:49.504773 kubelet[2056]: E1213 02:03:49.504697 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wlj2f" podUID="6caefe76-fe04-44c0-b43e-81fd39cda0c9" Dec 13 02:03:51.393402 env[1212]: time="2024-12-13T02:03:51.393342619Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:51.395605 env[1212]: time="2024-12-13T02:03:51.395565295Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:51.397966 env[1212]: time="2024-12-13T02:03:51.397911632Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:51.400368 env[1212]: time="2024-12-13T02:03:51.400315307Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:51.400988 env[1212]: time="2024-12-13T02:03:51.400958334Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 02:03:51.403963 env[1212]: time="2024-12-13T02:03:51.403915900Z" level=info msg="CreateContainer within sandbox \"8f900e27b5bcd7be5fd14a58e7d23ca397e17cf5bc8caee39c50cbf3b5784f67\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 02:03:51.418679 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3707895078.mount: Deactivated successfully. Dec 13 02:03:51.428870 env[1212]: time="2024-12-13T02:03:51.428822012Z" level=info msg="CreateContainer within sandbox \"8f900e27b5bcd7be5fd14a58e7d23ca397e17cf5bc8caee39c50cbf3b5784f67\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"10ce2355a13ec8b22637e573a2f3c4902348d7d86fb2425d1a42d756e5a383ee\"" Dec 13 02:03:51.429350 env[1212]: time="2024-12-13T02:03:51.429316882Z" level=info msg="StartContainer for \"10ce2355a13ec8b22637e573a2f3c4902348d7d86fb2425d1a42d756e5a383ee\"" Dec 13 02:03:51.449267 systemd[1]: Started cri-containerd-10ce2355a13ec8b22637e573a2f3c4902348d7d86fb2425d1a42d756e5a383ee.scope. Dec 13 02:03:51.460000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:51.460000 audit[2788]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f4706d3f0a8 items=0 ppid=2545 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:51.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130636532333535613133656338623232363337653537336132663363 Dec 13 02:03:51.460000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:51.460000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:51.460000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:51.460000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:51.460000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:51.460000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:51.460000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:51.460000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:51.460000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:51.460000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:51.460000 audit: BPF prog-id=133 op=LOAD Dec 13 02:03:51.460000 audit[2788]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001f9268 items=0 ppid=2545 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:51.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130636532333535613133656338623232363337653537336132663363 Dec 13 02:03:51.460000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:51.460000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:51.460000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:51.460000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:51.460000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:51.460000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:51.460000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:51.460000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:51.460000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:51.460000 audit: BPF prog-id=134 op=LOAD Dec 13 02:03:51.460000 audit[2788]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001f92b8 items=0 ppid=2545 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:51.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130636532333535613133656338623232363337653537336132663363 Dec 13 02:03:51.461000 audit: BPF prog-id=134 op=UNLOAD Dec 13 02:03:51.461000 audit: BPF prog-id=133 op=UNLOAD Dec 13 02:03:51.461000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:51.461000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:51.461000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:51.461000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:51.461000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:51.461000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:51.461000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:51.461000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:51.461000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:51.461000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:51.461000 audit: BPF prog-id=135 op=LOAD Dec 13 02:03:51.461000 audit[2788]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001f9348 items=0 ppid=2545 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:51.461000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130636532333535613133656338623232363337653537336132663363 Dec 13 02:03:51.479328 env[1212]: time="2024-12-13T02:03:51.479276102Z" level=info msg="StartContainer for \"10ce2355a13ec8b22637e573a2f3c4902348d7d86fb2425d1a42d756e5a383ee\" returns successfully" Dec 13 02:03:51.505586 kubelet[2056]: E1213 02:03:51.505330 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wlj2f" podUID="6caefe76-fe04-44c0-b43e-81fd39cda0c9" Dec 13 02:03:51.585909 kubelet[2056]: E1213 02:03:51.585864 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:51.679742 systemd[1]: Started sshd@9-10.0.0.89:22-10.0.0.1:47274.service. Dec 13 02:03:51.678000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.89:22-10.0.0.1:47274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:51.684205 kernel: kauditd_printk_skb: 44 callbacks suppressed Dec 13 02:03:51.684261 kernel: audit: type=1130 audit(1734055431.678:1007): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.89:22-10.0.0.1:47274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:52.220000 audit[2816]: USER_ACCT pid=2816 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:52.221453 sshd[2816]: Accepted publickey for core from 10.0.0.1 port 47274 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:03:52.225000 audit[2816]: CRED_ACQ pid=2816 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:52.227125 sshd[2816]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:03:52.230929 kernel: audit: type=1101 audit(1734055432.220:1008): pid=2816 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:52.231056 kernel: audit: type=1103 audit(1734055432.225:1009): pid=2816 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:52.231089 kernel: audit: type=1006 audit(1734055432.225:1010): pid=2816 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Dec 13 02:03:52.225000 audit[2816]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd0e75d950 a2=3 a3=0 items=0 ppid=1 pid=2816 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:52.239153 kernel: audit: type=1300 audit(1734055432.225:1010): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd0e75d950 a2=3 a3=0 items=0 ppid=1 pid=2816 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:52.236441 systemd[1]: Started session-10.scope. Dec 13 02:03:52.237639 systemd-logind[1199]: New session 10 of user core. Dec 13 02:03:52.225000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:03:52.241931 kernel: audit: type=1327 audit(1734055432.225:1010): proctitle=737368643A20636F7265205B707269765D Dec 13 02:03:52.242000 audit[2816]: USER_START pid=2816 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:52.249903 kernel: audit: type=1105 audit(1734055432.242:1011): pid=2816 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:52.248000 audit[2820]: CRED_ACQ pid=2820 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:52.254935 kernel: audit: type=1103 audit(1734055432.248:1012): pid=2820 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:52.916431 sshd[2816]: pam_unix(sshd:session): session closed for user core Dec 13 02:03:52.915000 audit[2816]: USER_END pid=2816 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:52.919355 systemd[1]: sshd@9-10.0.0.89:22-10.0.0.1:47274.service: Deactivated successfully. Dec 13 02:03:52.920205 systemd[1]: session-10.scope: Deactivated successfully. Dec 13 02:03:52.916000 audit[2816]: CRED_DISP pid=2816 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:52.923493 systemd-logind[1199]: Session 10 logged out. Waiting for processes to exit. Dec 13 02:03:52.924347 kubelet[2056]: E1213 02:03:52.924048 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wlj2f" podUID="6caefe76-fe04-44c0-b43e-81fd39cda0c9" Dec 13 02:03:52.924794 systemd-logind[1199]: Removed session 10. Dec 13 02:03:52.927986 kernel: audit: type=1106 audit(1734055432.915:1013): pid=2816 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:52.929416 kernel: audit: type=1104 audit(1734055432.916:1014): pid=2816 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:52.917000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.89:22-10.0.0.1:47274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:52.945846 kubelet[2056]: E1213 02:03:52.945812 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:54.142950 systemd[1]: cri-containerd-10ce2355a13ec8b22637e573a2f3c4902348d7d86fb2425d1a42d756e5a383ee.scope: Deactivated successfully. Dec 13 02:03:54.146000 audit: BPF prog-id=135 op=UNLOAD Dec 13 02:03:54.160963 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-10ce2355a13ec8b22637e573a2f3c4902348d7d86fb2425d1a42d756e5a383ee-rootfs.mount: Deactivated successfully. Dec 13 02:03:54.167115 kubelet[2056]: I1213 02:03:54.167083 2056 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 02:03:54.203098 env[1212]: time="2024-12-13T02:03:54.203044129Z" level=info msg="shim disconnected" id=10ce2355a13ec8b22637e573a2f3c4902348d7d86fb2425d1a42d756e5a383ee Dec 13 02:03:54.203098 env[1212]: time="2024-12-13T02:03:54.203092009Z" level=warning msg="cleaning up after shim disconnected" id=10ce2355a13ec8b22637e573a2f3c4902348d7d86fb2425d1a42d756e5a383ee namespace=k8s.io Dec 13 02:03:54.203098 env[1212]: time="2024-12-13T02:03:54.203100805Z" level=info msg="cleaning up dead shim" Dec 13 02:03:54.209964 kubelet[2056]: I1213 02:03:54.209922 2056 topology_manager.go:215] "Topology Admit Handler" podUID="096d0d62-3df0-48d4-9215-f440b6837177" podNamespace="kube-system" podName="coredns-7db6d8ff4d-zt92j" Dec 13 02:03:54.210164 kubelet[2056]: I1213 02:03:54.210149 2056 topology_manager.go:215] "Topology Admit Handler" podUID="571d000a-2d6a-4a9f-ac62-6d23835462b8" podNamespace="kube-system" podName="coredns-7db6d8ff4d-7bp6j" Dec 13 02:03:54.210281 kubelet[2056]: I1213 02:03:54.210256 2056 topology_manager.go:215] "Topology Admit Handler" podUID="ba1c6a87-03d0-4fc7-8058-05b0fe24f8ff" podNamespace="calico-system" podName="calico-kube-controllers-784649585b-dmq4n" Dec 13 02:03:54.210354 kubelet[2056]: I1213 02:03:54.210348 2056 topology_manager.go:215] "Topology Admit Handler" podUID="d9b9f041-0447-4f1c-aa10-5116ff6c6616" podNamespace="calico-apiserver" podName="calico-apiserver-7bffbb6c48-lhwh7" Dec 13 02:03:54.210438 kubelet[2056]: I1213 02:03:54.210424 2056 topology_manager.go:215] "Topology Admit Handler" podUID="591490e8-6d9f-4a88-89f8-2785413ddcdc" podNamespace="calico-apiserver" podName="calico-apiserver-7bffbb6c48-67kk2" Dec 13 02:03:54.213814 env[1212]: time="2024-12-13T02:03:54.213778285Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:03:54Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2844 runtime=io.containerd.runc.v2\n" Dec 13 02:03:54.215810 systemd[1]: Created slice kubepods-besteffort-pod591490e8_6d9f_4a88_89f8_2785413ddcdc.slice. Dec 13 02:03:54.220114 systemd[1]: Created slice kubepods-burstable-pod096d0d62_3df0_48d4_9215_f440b6837177.slice. Dec 13 02:03:54.224827 systemd[1]: Created slice kubepods-besteffort-podd9b9f041_0447_4f1c_aa10_5116ff6c6616.slice. Dec 13 02:03:54.229542 systemd[1]: Created slice kubepods-burstable-pod571d000a_2d6a_4a9f_ac62_6d23835462b8.slice. Dec 13 02:03:54.232140 systemd[1]: Created slice kubepods-besteffort-podba1c6a87_03d0_4fc7_8058_05b0fe24f8ff.slice. Dec 13 02:03:54.335443 kubelet[2056]: I1213 02:03:54.335399 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/591490e8-6d9f-4a88-89f8-2785413ddcdc-calico-apiserver-certs\") pod \"calico-apiserver-7bffbb6c48-67kk2\" (UID: \"591490e8-6d9f-4a88-89f8-2785413ddcdc\") " pod="calico-apiserver/calico-apiserver-7bffbb6c48-67kk2" Dec 13 02:03:54.335443 kubelet[2056]: I1213 02:03:54.335451 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4htw8\" (UniqueName: \"kubernetes.io/projected/591490e8-6d9f-4a88-89f8-2785413ddcdc-kube-api-access-4htw8\") pod \"calico-apiserver-7bffbb6c48-67kk2\" (UID: \"591490e8-6d9f-4a88-89f8-2785413ddcdc\") " pod="calico-apiserver/calico-apiserver-7bffbb6c48-67kk2" Dec 13 02:03:54.335697 kubelet[2056]: I1213 02:03:54.335481 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/571d000a-2d6a-4a9f-ac62-6d23835462b8-config-volume\") pod \"coredns-7db6d8ff4d-7bp6j\" (UID: \"571d000a-2d6a-4a9f-ac62-6d23835462b8\") " pod="kube-system/coredns-7db6d8ff4d-7bp6j" Dec 13 02:03:54.335697 kubelet[2056]: I1213 02:03:54.335502 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-l8h2q\" (UniqueName: \"kubernetes.io/projected/ba1c6a87-03d0-4fc7-8058-05b0fe24f8ff-kube-api-access-l8h2q\") pod \"calico-kube-controllers-784649585b-dmq4n\" (UID: \"ba1c6a87-03d0-4fc7-8058-05b0fe24f8ff\") " pod="calico-system/calico-kube-controllers-784649585b-dmq4n" Dec 13 02:03:54.335697 kubelet[2056]: I1213 02:03:54.335521 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/096d0d62-3df0-48d4-9215-f440b6837177-config-volume\") pod \"coredns-7db6d8ff4d-zt92j\" (UID: \"096d0d62-3df0-48d4-9215-f440b6837177\") " pod="kube-system/coredns-7db6d8ff4d-zt92j" Dec 13 02:03:54.335697 kubelet[2056]: I1213 02:03:54.335572 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-56mj5\" (UniqueName: \"kubernetes.io/projected/d9b9f041-0447-4f1c-aa10-5116ff6c6616-kube-api-access-56mj5\") pod \"calico-apiserver-7bffbb6c48-lhwh7\" (UID: \"d9b9f041-0447-4f1c-aa10-5116ff6c6616\") " pod="calico-apiserver/calico-apiserver-7bffbb6c48-lhwh7" Dec 13 02:03:54.335697 kubelet[2056]: I1213 02:03:54.335596 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pk9lm\" (UniqueName: \"kubernetes.io/projected/571d000a-2d6a-4a9f-ac62-6d23835462b8-kube-api-access-pk9lm\") pod \"coredns-7db6d8ff4d-7bp6j\" (UID: \"571d000a-2d6a-4a9f-ac62-6d23835462b8\") " pod="kube-system/coredns-7db6d8ff4d-7bp6j" Dec 13 02:03:54.335859 kubelet[2056]: I1213 02:03:54.335617 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/ba1c6a87-03d0-4fc7-8058-05b0fe24f8ff-tigera-ca-bundle\") pod \"calico-kube-controllers-784649585b-dmq4n\" (UID: \"ba1c6a87-03d0-4fc7-8058-05b0fe24f8ff\") " pod="calico-system/calico-kube-controllers-784649585b-dmq4n" Dec 13 02:03:54.335859 kubelet[2056]: I1213 02:03:54.335638 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/d9b9f041-0447-4f1c-aa10-5116ff6c6616-calico-apiserver-certs\") pod \"calico-apiserver-7bffbb6c48-lhwh7\" (UID: \"d9b9f041-0447-4f1c-aa10-5116ff6c6616\") " pod="calico-apiserver/calico-apiserver-7bffbb6c48-lhwh7" Dec 13 02:03:54.335859 kubelet[2056]: I1213 02:03:54.335660 2056 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jktmn\" (UniqueName: \"kubernetes.io/projected/096d0d62-3df0-48d4-9215-f440b6837177-kube-api-access-jktmn\") pod \"coredns-7db6d8ff4d-zt92j\" (UID: \"096d0d62-3df0-48d4-9215-f440b6837177\") " pod="kube-system/coredns-7db6d8ff4d-zt92j" Dec 13 02:03:54.508728 systemd[1]: Created slice kubepods-besteffort-pod6caefe76_fe04_44c0_b43e_81fd39cda0c9.slice. Dec 13 02:03:54.510351 env[1212]: time="2024-12-13T02:03:54.510322579Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wlj2f,Uid:6caefe76-fe04-44c0-b43e-81fd39cda0c9,Namespace:calico-system,Attempt:0,}" Dec 13 02:03:54.517873 env[1212]: time="2024-12-13T02:03:54.517843823Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7bffbb6c48-67kk2,Uid:591490e8-6d9f-4a88-89f8-2785413ddcdc,Namespace:calico-apiserver,Attempt:0,}" Dec 13 02:03:54.523130 kubelet[2056]: E1213 02:03:54.523083 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:54.523550 env[1212]: time="2024-12-13T02:03:54.523491648Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-zt92j,Uid:096d0d62-3df0-48d4-9215-f440b6837177,Namespace:kube-system,Attempt:0,}" Dec 13 02:03:54.526906 env[1212]: time="2024-12-13T02:03:54.526849454Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7bffbb6c48-lhwh7,Uid:d9b9f041-0447-4f1c-aa10-5116ff6c6616,Namespace:calico-apiserver,Attempt:0,}" Dec 13 02:03:54.531149 kubelet[2056]: E1213 02:03:54.531104 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:54.531460 env[1212]: time="2024-12-13T02:03:54.531419536Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-7bp6j,Uid:571d000a-2d6a-4a9f-ac62-6d23835462b8,Namespace:kube-system,Attempt:0,}" Dec 13 02:03:54.534016 env[1212]: time="2024-12-13T02:03:54.533976988Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-784649585b-dmq4n,Uid:ba1c6a87-03d0-4fc7-8058-05b0fe24f8ff,Namespace:calico-system,Attempt:0,}" Dec 13 02:03:54.949481 kubelet[2056]: E1213 02:03:54.949451 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:54.950769 env[1212]: time="2024-12-13T02:03:54.950721165Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 02:03:55.404540 env[1212]: time="2024-12-13T02:03:55.404329304Z" level=error msg="Failed to destroy network for sandbox \"b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:03:55.404958 env[1212]: time="2024-12-13T02:03:55.404806069Z" level=error msg="encountered an error cleaning up failed sandbox \"b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:03:55.404958 env[1212]: time="2024-12-13T02:03:55.404872895Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wlj2f,Uid:6caefe76-fe04-44c0-b43e-81fd39cda0c9,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:03:55.405721 kubelet[2056]: E1213 02:03:55.405212 2056 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:03:55.405721 kubelet[2056]: E1213 02:03:55.405337 2056 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-wlj2f" Dec 13 02:03:55.405721 kubelet[2056]: E1213 02:03:55.405366 2056 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-wlj2f" Dec 13 02:03:55.406053 kubelet[2056]: E1213 02:03:55.405427 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-wlj2f_calico-system(6caefe76-fe04-44c0-b43e-81fd39cda0c9)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-wlj2f_calico-system(6caefe76-fe04-44c0-b43e-81fd39cda0c9)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-wlj2f" podUID="6caefe76-fe04-44c0-b43e-81fd39cda0c9" Dec 13 02:03:55.417814 env[1212]: time="2024-12-13T02:03:55.417727171Z" level=error msg="Failed to destroy network for sandbox \"9d95f3ac6d19a4df2019b6f9ef3a3722032c276b32d80996442800cc1b0788ab\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:03:55.418260 env[1212]: time="2024-12-13T02:03:55.418211400Z" level=error msg="encountered an error cleaning up failed sandbox \"9d95f3ac6d19a4df2019b6f9ef3a3722032c276b32d80996442800cc1b0788ab\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:03:55.418328 env[1212]: time="2024-12-13T02:03:55.418285299Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-zt92j,Uid:096d0d62-3df0-48d4-9215-f440b6837177,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9d95f3ac6d19a4df2019b6f9ef3a3722032c276b32d80996442800cc1b0788ab\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:03:55.419020 kubelet[2056]: E1213 02:03:55.418528 2056 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9d95f3ac6d19a4df2019b6f9ef3a3722032c276b32d80996442800cc1b0788ab\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:03:55.419020 kubelet[2056]: E1213 02:03:55.418602 2056 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9d95f3ac6d19a4df2019b6f9ef3a3722032c276b32d80996442800cc1b0788ab\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-zt92j" Dec 13 02:03:55.419020 kubelet[2056]: E1213 02:03:55.418627 2056 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9d95f3ac6d19a4df2019b6f9ef3a3722032c276b32d80996442800cc1b0788ab\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-zt92j" Dec 13 02:03:55.419190 kubelet[2056]: E1213 02:03:55.418692 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-zt92j_kube-system(096d0d62-3df0-48d4-9215-f440b6837177)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-zt92j_kube-system(096d0d62-3df0-48d4-9215-f440b6837177)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9d95f3ac6d19a4df2019b6f9ef3a3722032c276b32d80996442800cc1b0788ab\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-zt92j" podUID="096d0d62-3df0-48d4-9215-f440b6837177" Dec 13 02:03:55.421604 env[1212]: time="2024-12-13T02:03:55.421550960Z" level=error msg="Failed to destroy network for sandbox \"511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:03:55.422023 env[1212]: time="2024-12-13T02:03:55.421964036Z" level=error msg="encountered an error cleaning up failed sandbox \"511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:03:55.422088 env[1212]: time="2024-12-13T02:03:55.422048174Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7bffbb6c48-lhwh7,Uid:d9b9f041-0447-4f1c-aa10-5116ff6c6616,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:03:55.422088 env[1212]: time="2024-12-13T02:03:55.422039176Z" level=error msg="Failed to destroy network for sandbox \"2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:03:55.422261 kubelet[2056]: E1213 02:03:55.422227 2056 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:03:55.422308 kubelet[2056]: E1213 02:03:55.422279 2056 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7bffbb6c48-lhwh7" Dec 13 02:03:55.422308 kubelet[2056]: E1213 02:03:55.422296 2056 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7bffbb6c48-lhwh7" Dec 13 02:03:55.422370 kubelet[2056]: E1213 02:03:55.422340 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-7bffbb6c48-lhwh7_calico-apiserver(d9b9f041-0447-4f1c-aa10-5116ff6c6616)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-7bffbb6c48-lhwh7_calico-apiserver(d9b9f041-0447-4f1c-aa10-5116ff6c6616)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7bffbb6c48-lhwh7" podUID="d9b9f041-0447-4f1c-aa10-5116ff6c6616" Dec 13 02:03:55.422513 env[1212]: time="2024-12-13T02:03:55.422471840Z" level=error msg="encountered an error cleaning up failed sandbox \"2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:03:55.422584 env[1212]: time="2024-12-13T02:03:55.422545608Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7bffbb6c48-67kk2,Uid:591490e8-6d9f-4a88-89f8-2785413ddcdc,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:03:55.422789 kubelet[2056]: E1213 02:03:55.422747 2056 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:03:55.422866 kubelet[2056]: E1213 02:03:55.422813 2056 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7bffbb6c48-67kk2" Dec 13 02:03:55.422866 kubelet[2056]: E1213 02:03:55.422834 2056 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7bffbb6c48-67kk2" Dec 13 02:03:55.422965 kubelet[2056]: E1213 02:03:55.422881 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-7bffbb6c48-67kk2_calico-apiserver(591490e8-6d9f-4a88-89f8-2785413ddcdc)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-7bffbb6c48-67kk2_calico-apiserver(591490e8-6d9f-4a88-89f8-2785413ddcdc)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7bffbb6c48-67kk2" podUID="591490e8-6d9f-4a88-89f8-2785413ddcdc" Dec 13 02:03:55.443075 env[1212]: time="2024-12-13T02:03:55.442981890Z" level=error msg="Failed to destroy network for sandbox \"ef5585c89920b4677b8ae95fe230f81b58d43df20d41f8e3a620c6fc316661cb\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:03:55.443310 env[1212]: time="2024-12-13T02:03:55.443279248Z" level=error msg="encountered an error cleaning up failed sandbox \"ef5585c89920b4677b8ae95fe230f81b58d43df20d41f8e3a620c6fc316661cb\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:03:55.443533 env[1212]: time="2024-12-13T02:03:55.443494232Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-7bp6j,Uid:571d000a-2d6a-4a9f-ac62-6d23835462b8,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ef5585c89920b4677b8ae95fe230f81b58d43df20d41f8e3a620c6fc316661cb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:03:55.443844 kubelet[2056]: E1213 02:03:55.443796 2056 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ef5585c89920b4677b8ae95fe230f81b58d43df20d41f8e3a620c6fc316661cb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:03:55.443928 kubelet[2056]: E1213 02:03:55.443864 2056 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ef5585c89920b4677b8ae95fe230f81b58d43df20d41f8e3a620c6fc316661cb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-7bp6j" Dec 13 02:03:55.443928 kubelet[2056]: E1213 02:03:55.443894 2056 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ef5585c89920b4677b8ae95fe230f81b58d43df20d41f8e3a620c6fc316661cb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-7bp6j" Dec 13 02:03:55.443988 kubelet[2056]: E1213 02:03:55.443935 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-7bp6j_kube-system(571d000a-2d6a-4a9f-ac62-6d23835462b8)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-7bp6j_kube-system(571d000a-2d6a-4a9f-ac62-6d23835462b8)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ef5585c89920b4677b8ae95fe230f81b58d43df20d41f8e3a620c6fc316661cb\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-7bp6j" podUID="571d000a-2d6a-4a9f-ac62-6d23835462b8" Dec 13 02:03:55.447710 env[1212]: time="2024-12-13T02:03:55.447659514Z" level=error msg="Failed to destroy network for sandbox \"c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:03:55.448029 env[1212]: time="2024-12-13T02:03:55.447996405Z" level=error msg="encountered an error cleaning up failed sandbox \"c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:03:55.448072 env[1212]: time="2024-12-13T02:03:55.448042762Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-784649585b-dmq4n,Uid:ba1c6a87-03d0-4fc7-8058-05b0fe24f8ff,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:03:55.448285 kubelet[2056]: E1213 02:03:55.448238 2056 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:03:55.448400 kubelet[2056]: E1213 02:03:55.448303 2056 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-784649585b-dmq4n" Dec 13 02:03:55.448400 kubelet[2056]: E1213 02:03:55.448323 2056 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-784649585b-dmq4n" Dec 13 02:03:55.448400 kubelet[2056]: E1213 02:03:55.448365 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-784649585b-dmq4n_calico-system(ba1c6a87-03d0-4fc7-8058-05b0fe24f8ff)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-784649585b-dmq4n_calico-system(ba1c6a87-03d0-4fc7-8058-05b0fe24f8ff)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-784649585b-dmq4n" podUID="ba1c6a87-03d0-4fc7-8058-05b0fe24f8ff" Dec 13 02:03:55.952272 kubelet[2056]: I1213 02:03:55.952239 2056 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9d95f3ac6d19a4df2019b6f9ef3a3722032c276b32d80996442800cc1b0788ab" Dec 13 02:03:55.953183 env[1212]: time="2024-12-13T02:03:55.953146425Z" level=info msg="StopPodSandbox for \"9d95f3ac6d19a4df2019b6f9ef3a3722032c276b32d80996442800cc1b0788ab\"" Dec 13 02:03:55.953926 kubelet[2056]: I1213 02:03:55.953890 2056 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af" Dec 13 02:03:55.954576 env[1212]: time="2024-12-13T02:03:55.954534210Z" level=info msg="StopPodSandbox for \"c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af\"" Dec 13 02:03:55.955321 kubelet[2056]: I1213 02:03:55.955280 2056 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e" Dec 13 02:03:55.955787 env[1212]: time="2024-12-13T02:03:55.955762737Z" level=info msg="StopPodSandbox for \"b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e\"" Dec 13 02:03:55.956341 kubelet[2056]: I1213 02:03:55.956314 2056 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ef5585c89920b4677b8ae95fe230f81b58d43df20d41f8e3a620c6fc316661cb" Dec 13 02:03:55.956632 env[1212]: time="2024-12-13T02:03:55.956607633Z" level=info msg="StopPodSandbox for \"ef5585c89920b4677b8ae95fe230f81b58d43df20d41f8e3a620c6fc316661cb\"" Dec 13 02:03:55.957555 kubelet[2056]: I1213 02:03:55.957514 2056 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460" Dec 13 02:03:55.957953 env[1212]: time="2024-12-13T02:03:55.957926540Z" level=info msg="StopPodSandbox for \"511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460\"" Dec 13 02:03:55.959382 kubelet[2056]: I1213 02:03:55.958987 2056 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6" Dec 13 02:03:55.959624 env[1212]: time="2024-12-13T02:03:55.959543536Z" level=info msg="StopPodSandbox for \"2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6\"" Dec 13 02:03:55.988402 env[1212]: time="2024-12-13T02:03:55.988341469Z" level=error msg="StopPodSandbox for \"b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e\" failed" error="failed to destroy network for sandbox \"b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:03:55.988641 kubelet[2056]: E1213 02:03:55.988593 2056 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e" Dec 13 02:03:55.988755 kubelet[2056]: E1213 02:03:55.988694 2056 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e"} Dec 13 02:03:55.988823 kubelet[2056]: E1213 02:03:55.988767 2056 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6caefe76-fe04-44c0-b43e-81fd39cda0c9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:03:55.988823 kubelet[2056]: E1213 02:03:55.988792 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6caefe76-fe04-44c0-b43e-81fd39cda0c9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-wlj2f" podUID="6caefe76-fe04-44c0-b43e-81fd39cda0c9" Dec 13 02:03:56.006124 env[1212]: time="2024-12-13T02:03:56.006053856Z" level=error msg="StopPodSandbox for \"ef5585c89920b4677b8ae95fe230f81b58d43df20d41f8e3a620c6fc316661cb\" failed" error="failed to destroy network for sandbox \"ef5585c89920b4677b8ae95fe230f81b58d43df20d41f8e3a620c6fc316661cb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:03:56.006715 kubelet[2056]: E1213 02:03:56.006547 2056 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ef5585c89920b4677b8ae95fe230f81b58d43df20d41f8e3a620c6fc316661cb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ef5585c89920b4677b8ae95fe230f81b58d43df20d41f8e3a620c6fc316661cb" Dec 13 02:03:56.006715 kubelet[2056]: E1213 02:03:56.006601 2056 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ef5585c89920b4677b8ae95fe230f81b58d43df20d41f8e3a620c6fc316661cb"} Dec 13 02:03:56.006715 kubelet[2056]: E1213 02:03:56.006638 2056 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"571d000a-2d6a-4a9f-ac62-6d23835462b8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ef5585c89920b4677b8ae95fe230f81b58d43df20d41f8e3a620c6fc316661cb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:03:56.006715 kubelet[2056]: E1213 02:03:56.006664 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"571d000a-2d6a-4a9f-ac62-6d23835462b8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ef5585c89920b4677b8ae95fe230f81b58d43df20d41f8e3a620c6fc316661cb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-7bp6j" podUID="571d000a-2d6a-4a9f-ac62-6d23835462b8" Dec 13 02:03:56.013301 env[1212]: time="2024-12-13T02:03:56.013229989Z" level=error msg="StopPodSandbox for \"2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6\" failed" error="failed to destroy network for sandbox \"2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:03:56.013558 kubelet[2056]: E1213 02:03:56.013510 2056 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6" Dec 13 02:03:56.013631 kubelet[2056]: E1213 02:03:56.013571 2056 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6"} Dec 13 02:03:56.013631 kubelet[2056]: E1213 02:03:56.013619 2056 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"591490e8-6d9f-4a88-89f8-2785413ddcdc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:03:56.013738 kubelet[2056]: E1213 02:03:56.013652 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"591490e8-6d9f-4a88-89f8-2785413ddcdc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7bffbb6c48-67kk2" podUID="591490e8-6d9f-4a88-89f8-2785413ddcdc" Dec 13 02:03:56.018042 env[1212]: time="2024-12-13T02:03:56.017978876Z" level=error msg="StopPodSandbox for \"511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460\" failed" error="failed to destroy network for sandbox \"511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:03:56.018210 kubelet[2056]: E1213 02:03:56.018173 2056 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460" Dec 13 02:03:56.018263 kubelet[2056]: E1213 02:03:56.018215 2056 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460"} Dec 13 02:03:56.018288 kubelet[2056]: E1213 02:03:56.018258 2056 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d9b9f041-0447-4f1c-aa10-5116ff6c6616\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:03:56.018356 kubelet[2056]: E1213 02:03:56.018284 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d9b9f041-0447-4f1c-aa10-5116ff6c6616\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7bffbb6c48-lhwh7" podUID="d9b9f041-0447-4f1c-aa10-5116ff6c6616" Dec 13 02:03:56.018473 env[1212]: time="2024-12-13T02:03:56.018425674Z" level=error msg="StopPodSandbox for \"c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af\" failed" error="failed to destroy network for sandbox \"c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:03:56.018618 kubelet[2056]: E1213 02:03:56.018592 2056 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af" Dec 13 02:03:56.018664 kubelet[2056]: E1213 02:03:56.018626 2056 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af"} Dec 13 02:03:56.018664 kubelet[2056]: E1213 02:03:56.018653 2056 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ba1c6a87-03d0-4fc7-8058-05b0fe24f8ff\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:03:56.018738 kubelet[2056]: E1213 02:03:56.018676 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ba1c6a87-03d0-4fc7-8058-05b0fe24f8ff\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-784649585b-dmq4n" podUID="ba1c6a87-03d0-4fc7-8058-05b0fe24f8ff" Dec 13 02:03:56.021017 env[1212]: time="2024-12-13T02:03:56.020962256Z" level=error msg="StopPodSandbox for \"9d95f3ac6d19a4df2019b6f9ef3a3722032c276b32d80996442800cc1b0788ab\" failed" error="failed to destroy network for sandbox \"9d95f3ac6d19a4df2019b6f9ef3a3722032c276b32d80996442800cc1b0788ab\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:03:56.021181 kubelet[2056]: E1213 02:03:56.021138 2056 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9d95f3ac6d19a4df2019b6f9ef3a3722032c276b32d80996442800cc1b0788ab\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9d95f3ac6d19a4df2019b6f9ef3a3722032c276b32d80996442800cc1b0788ab" Dec 13 02:03:56.021266 kubelet[2056]: E1213 02:03:56.021190 2056 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9d95f3ac6d19a4df2019b6f9ef3a3722032c276b32d80996442800cc1b0788ab"} Dec 13 02:03:56.021266 kubelet[2056]: E1213 02:03:56.021220 2056 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"096d0d62-3df0-48d4-9215-f440b6837177\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9d95f3ac6d19a4df2019b6f9ef3a3722032c276b32d80996442800cc1b0788ab\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:03:56.021266 kubelet[2056]: E1213 02:03:56.021241 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"096d0d62-3df0-48d4-9215-f440b6837177\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9d95f3ac6d19a4df2019b6f9ef3a3722032c276b32d80996442800cc1b0788ab\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-zt92j" podUID="096d0d62-3df0-48d4-9215-f440b6837177" Dec 13 02:03:56.161715 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6-shm.mount: Deactivated successfully. Dec 13 02:03:56.161786 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460-shm.mount: Deactivated successfully. Dec 13 02:03:56.161876 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e-shm.mount: Deactivated successfully. Dec 13 02:03:57.099602 kubelet[2056]: I1213 02:03:57.099555 2056 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 02:03:57.100390 kubelet[2056]: E1213 02:03:57.100369 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:57.234000 audit[3242]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=3242 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:03:57.240155 kernel: kauditd_printk_skb: 2 callbacks suppressed Dec 13 02:03:57.240216 kernel: audit: type=1325 audit(1734055437.234:1017): table=filter:95 family=2 entries=17 op=nft_register_rule pid=3242 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:03:57.240251 kernel: audit: type=1300 audit(1734055437.234:1017): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff1b76f000 a2=0 a3=7fff1b76efec items=0 ppid=2232 pid=3242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:57.234000 audit[3242]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff1b76f000 a2=0 a3=7fff1b76efec items=0 ppid=2232 pid=3242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:57.234000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:03:57.248422 kernel: audit: type=1327 audit(1734055437.234:1017): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:03:57.248000 audit[3242]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3242 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:03:57.248000 audit[3242]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7fff1b76f000 a2=0 a3=7fff1b76efec items=0 ppid=2232 pid=3242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:57.259234 kernel: audit: type=1325 audit(1734055437.248:1018): table=nat:96 family=2 entries=19 op=nft_register_chain pid=3242 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:03:57.259292 kernel: audit: type=1300 audit(1734055437.248:1018): arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7fff1b76f000 a2=0 a3=7fff1b76efec items=0 ppid=2232 pid=3242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:57.259335 kernel: audit: type=1327 audit(1734055437.248:1018): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:03:57.248000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:03:57.921400 systemd[1]: Started sshd@10-10.0.0.89:22-10.0.0.1:38816.service. Dec 13 02:03:57.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.89:22-10.0.0.1:38816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:57.925904 kernel: audit: type=1130 audit(1734055437.919:1019): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.89:22-10.0.0.1:38816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:57.959000 audit[3246]: USER_ACCT pid=3246 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:57.961826 sshd[3246]: Accepted publickey for core from 10.0.0.1 port 38816 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:03:57.962989 kubelet[2056]: E1213 02:03:57.962960 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:57.965000 audit[3246]: CRED_ACQ pid=3246 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:57.967723 sshd[3246]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:03:57.971217 systemd-logind[1199]: New session 11 of user core. Dec 13 02:03:57.972073 systemd[1]: Started session-11.scope. Dec 13 02:03:57.972161 kernel: audit: type=1101 audit(1734055437.959:1020): pid=3246 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:57.972186 kernel: audit: type=1103 audit(1734055437.965:1021): pid=3246 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:57.975846 kernel: audit: type=1006 audit(1734055437.965:1022): pid=3246 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Dec 13 02:03:57.965000 audit[3246]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc02477ef0 a2=3 a3=0 items=0 ppid=1 pid=3246 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:57.965000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:03:57.974000 audit[3246]: USER_START pid=3246 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:57.975000 audit[3248]: CRED_ACQ pid=3248 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:58.086412 sshd[3246]: pam_unix(sshd:session): session closed for user core Dec 13 02:03:58.085000 audit[3246]: USER_END pid=3246 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:58.085000 audit[3246]: CRED_DISP pid=3246 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:58.089364 systemd[1]: sshd@10-10.0.0.89:22-10.0.0.1:38816.service: Deactivated successfully. Dec 13 02:03:58.087000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.89:22-10.0.0.1:38816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:58.090075 systemd[1]: session-11.scope: Deactivated successfully. Dec 13 02:03:58.090611 systemd-logind[1199]: Session 11 logged out. Waiting for processes to exit. Dec 13 02:03:58.091790 systemd[1]: Started sshd@11-10.0.0.89:22-10.0.0.1:38822.service. Dec 13 02:03:58.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.89:22-10.0.0.1:38822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:58.092734 systemd-logind[1199]: Removed session 11. Dec 13 02:03:58.126000 audit[3260]: USER_ACCT pid=3260 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:58.128599 sshd[3260]: Accepted publickey for core from 10.0.0.1 port 38822 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:03:58.127000 audit[3260]: CRED_ACQ pid=3260 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:58.127000 audit[3260]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7b345080 a2=3 a3=0 items=0 ppid=1 pid=3260 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:58.127000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:03:58.129512 sshd[3260]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:03:58.132603 systemd-logind[1199]: New session 12 of user core. Dec 13 02:03:58.133375 systemd[1]: Started session-12.scope. Dec 13 02:03:58.135000 audit[3260]: USER_START pid=3260 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:58.136000 audit[3262]: CRED_ACQ pid=3262 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:58.298217 sshd[3260]: pam_unix(sshd:session): session closed for user core Dec 13 02:03:58.297000 audit[3260]: USER_END pid=3260 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:58.297000 audit[3260]: CRED_DISP pid=3260 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:58.301077 systemd[1]: sshd@11-10.0.0.89:22-10.0.0.1:38822.service: Deactivated successfully. Dec 13 02:03:58.299000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.89:22-10.0.0.1:38822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:58.301827 systemd[1]: session-12.scope: Deactivated successfully. Dec 13 02:03:58.301000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.89:22-10.0.0.1:38838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:58.303338 systemd[1]: Started sshd@12-10.0.0.89:22-10.0.0.1:38838.service. Dec 13 02:03:58.303388 systemd-logind[1199]: Session 12 logged out. Waiting for processes to exit. Dec 13 02:03:58.304497 systemd-logind[1199]: Removed session 12. Dec 13 02:03:58.346000 audit[3271]: USER_ACCT pid=3271 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:58.348166 sshd[3271]: Accepted publickey for core from 10.0.0.1 port 38838 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:03:58.347000 audit[3271]: CRED_ACQ pid=3271 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:58.347000 audit[3271]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed35c26a0 a2=3 a3=0 items=0 ppid=1 pid=3271 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:58.347000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:03:58.349381 sshd[3271]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:03:58.352652 systemd-logind[1199]: New session 13 of user core. Dec 13 02:03:58.353434 systemd[1]: Started session-13.scope. Dec 13 02:03:58.355000 audit[3271]: USER_START pid=3271 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:58.356000 audit[3273]: CRED_ACQ pid=3273 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:58.480406 sshd[3271]: pam_unix(sshd:session): session closed for user core Dec 13 02:03:58.479000 audit[3271]: USER_END pid=3271 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:58.479000 audit[3271]: CRED_DISP pid=3271 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:58.480000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.89:22-10.0.0.1:38838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:58.482687 systemd[1]: sshd@12-10.0.0.89:22-10.0.0.1:38838.service: Deactivated successfully. Dec 13 02:03:58.483303 systemd[1]: session-13.scope: Deactivated successfully. Dec 13 02:03:58.484171 systemd-logind[1199]: Session 13 logged out. Waiting for processes to exit. Dec 13 02:03:58.484837 systemd-logind[1199]: Removed session 13. Dec 13 02:04:03.486084 systemd[1]: Started sshd@13-10.0.0.89:22-10.0.0.1:38846.service. Dec 13 02:04:03.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.89:22-10.0.0.1:38846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:03.487629 kernel: kauditd_printk_skb: 29 callbacks suppressed Dec 13 02:04:03.487848 kernel: audit: type=1130 audit(1734055443.484:1046): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.89:22-10.0.0.1:38846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:03.525000 audit[3285]: USER_ACCT pid=3285 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:03.528655 sshd[3285]: Accepted publickey for core from 10.0.0.1 port 38846 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:04:03.530000 audit[3285]: CRED_ACQ pid=3285 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:03.533234 sshd[3285]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:04:03.537234 kernel: audit: type=1101 audit(1734055443.525:1047): pid=3285 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:03.537404 kernel: audit: type=1103 audit(1734055443.530:1048): pid=3285 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:03.537461 kernel: audit: type=1006 audit(1734055443.530:1049): pid=3285 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Dec 13 02:04:03.537941 systemd-logind[1199]: New session 14 of user core. Dec 13 02:04:03.540061 kernel: audit: type=1300 audit(1734055443.530:1049): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe458131f0 a2=3 a3=0 items=0 ppid=1 pid=3285 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:03.530000 audit[3285]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe458131f0 a2=3 a3=0 items=0 ppid=1 pid=3285 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:03.538554 systemd[1]: Started session-14.scope. Dec 13 02:04:03.530000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:04:03.542000 audit[3285]: USER_START pid=3285 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:03.551778 kernel: audit: type=1327 audit(1734055443.530:1049): proctitle=737368643A20636F7265205B707269765D Dec 13 02:04:03.551874 kernel: audit: type=1105 audit(1734055443.542:1050): pid=3285 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:03.543000 audit[3287]: CRED_ACQ pid=3287 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:03.556921 kernel: audit: type=1103 audit(1734055443.543:1051): pid=3287 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:03.664158 sshd[3285]: pam_unix(sshd:session): session closed for user core Dec 13 02:04:03.663000 audit[3285]: USER_END pid=3285 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:03.667643 systemd[1]: sshd@13-10.0.0.89:22-10.0.0.1:38846.service: Deactivated successfully. Dec 13 02:04:03.668518 systemd[1]: session-14.scope: Deactivated successfully. Dec 13 02:04:03.663000 audit[3285]: CRED_DISP pid=3285 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:03.673914 kernel: audit: type=1106 audit(1734055443.663:1052): pid=3285 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:03.674063 kernel: audit: type=1104 audit(1734055443.663:1053): pid=3285 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:03.665000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.89:22-10.0.0.1:38846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:03.674845 systemd-logind[1199]: Session 14 logged out. Waiting for processes to exit. Dec 13 02:04:03.675636 systemd-logind[1199]: Removed session 14. Dec 13 02:04:05.249197 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3895840267.mount: Deactivated successfully. Dec 13 02:04:07.505774 env[1212]: time="2024-12-13T02:04:07.505720273Z" level=info msg="StopPodSandbox for \"9d95f3ac6d19a4df2019b6f9ef3a3722032c276b32d80996442800cc1b0788ab\"" Dec 13 02:04:07.505774 env[1212]: time="2024-12-13T02:04:07.505723780Z" level=info msg="StopPodSandbox for \"ef5585c89920b4677b8ae95fe230f81b58d43df20d41f8e3a620c6fc316661cb\"" Dec 13 02:04:07.567141 env[1212]: time="2024-12-13T02:04:07.567062327Z" level=error msg="StopPodSandbox for \"ef5585c89920b4677b8ae95fe230f81b58d43df20d41f8e3a620c6fc316661cb\" failed" error="failed to destroy network for sandbox \"ef5585c89920b4677b8ae95fe230f81b58d43df20d41f8e3a620c6fc316661cb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:04:07.567352 kubelet[2056]: E1213 02:04:07.567306 2056 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ef5585c89920b4677b8ae95fe230f81b58d43df20d41f8e3a620c6fc316661cb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ef5585c89920b4677b8ae95fe230f81b58d43df20d41f8e3a620c6fc316661cb" Dec 13 02:04:07.567667 kubelet[2056]: E1213 02:04:07.567360 2056 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ef5585c89920b4677b8ae95fe230f81b58d43df20d41f8e3a620c6fc316661cb"} Dec 13 02:04:07.567667 kubelet[2056]: E1213 02:04:07.567399 2056 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"571d000a-2d6a-4a9f-ac62-6d23835462b8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ef5585c89920b4677b8ae95fe230f81b58d43df20d41f8e3a620c6fc316661cb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:04:07.567667 kubelet[2056]: E1213 02:04:07.567421 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"571d000a-2d6a-4a9f-ac62-6d23835462b8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ef5585c89920b4677b8ae95fe230f81b58d43df20d41f8e3a620c6fc316661cb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-7bp6j" podUID="571d000a-2d6a-4a9f-ac62-6d23835462b8" Dec 13 02:04:07.569622 env[1212]: time="2024-12-13T02:04:07.569566005Z" level=error msg="StopPodSandbox for \"9d95f3ac6d19a4df2019b6f9ef3a3722032c276b32d80996442800cc1b0788ab\" failed" error="failed to destroy network for sandbox \"9d95f3ac6d19a4df2019b6f9ef3a3722032c276b32d80996442800cc1b0788ab\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:04:07.569789 kubelet[2056]: E1213 02:04:07.569750 2056 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9d95f3ac6d19a4df2019b6f9ef3a3722032c276b32d80996442800cc1b0788ab\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9d95f3ac6d19a4df2019b6f9ef3a3722032c276b32d80996442800cc1b0788ab" Dec 13 02:04:07.569841 kubelet[2056]: E1213 02:04:07.569791 2056 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9d95f3ac6d19a4df2019b6f9ef3a3722032c276b32d80996442800cc1b0788ab"} Dec 13 02:04:07.569841 kubelet[2056]: E1213 02:04:07.569812 2056 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"096d0d62-3df0-48d4-9215-f440b6837177\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9d95f3ac6d19a4df2019b6f9ef3a3722032c276b32d80996442800cc1b0788ab\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:04:07.569841 kubelet[2056]: E1213 02:04:07.569828 2056 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"096d0d62-3df0-48d4-9215-f440b6837177\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9d95f3ac6d19a4df2019b6f9ef3a3722032c276b32d80996442800cc1b0788ab\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-zt92j" podUID="096d0d62-3df0-48d4-9215-f440b6837177" Dec 13 02:04:07.682787 env[1212]: time="2024-12-13T02:04:07.682720090Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:07.729935 env[1212]: time="2024-12-13T02:04:07.729858661Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:07.749289 env[1212]: time="2024-12-13T02:04:07.749233326Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:07.781261 env[1212]: time="2024-12-13T02:04:07.781125469Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:07.781678 env[1212]: time="2024-12-13T02:04:07.781642159Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 02:04:07.789806 env[1212]: time="2024-12-13T02:04:07.789752827Z" level=info msg="CreateContainer within sandbox \"8f900e27b5bcd7be5fd14a58e7d23ca397e17cf5bc8caee39c50cbf3b5784f67\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 02:04:08.115078 env[1212]: time="2024-12-13T02:04:08.114931761Z" level=info msg="CreateContainer within sandbox \"8f900e27b5bcd7be5fd14a58e7d23ca397e17cf5bc8caee39c50cbf3b5784f67\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"ac72c41efadd5af4e25c92658d4fe34952cb06a070f28f4fa887c33ee7d56550\"" Dec 13 02:04:08.115754 env[1212]: time="2024-12-13T02:04:08.115720902Z" level=info msg="StartContainer for \"ac72c41efadd5af4e25c92658d4fe34952cb06a070f28f4fa887c33ee7d56550\"" Dec 13 02:04:08.134558 systemd[1]: Started cri-containerd-ac72c41efadd5af4e25c92658d4fe34952cb06a070f28f4fa887c33ee7d56550.scope. Dec 13 02:04:08.146000 audit[3354]: AVC avc: denied { perfmon } for pid=3354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.146000 audit[3354]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f70bda7c848 items=0 ppid=2545 pid=3354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:08.146000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163373263343165666164643561663465323563393236353864346665 Dec 13 02:04:08.146000 audit[3354]: AVC avc: denied { bpf } for pid=3354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.146000 audit[3354]: AVC avc: denied { bpf } for pid=3354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.146000 audit[3354]: AVC avc: denied { bpf } for pid=3354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.146000 audit[3354]: AVC avc: denied { perfmon } for pid=3354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.146000 audit[3354]: AVC avc: denied { perfmon } for pid=3354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.146000 audit[3354]: AVC avc: denied { perfmon } for pid=3354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.146000 audit[3354]: AVC avc: denied { perfmon } for pid=3354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.146000 audit[3354]: AVC avc: denied { perfmon } for pid=3354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.146000 audit[3354]: AVC avc: denied { bpf } for pid=3354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.146000 audit[3354]: AVC avc: denied { bpf } for pid=3354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.146000 audit: BPF prog-id=136 op=LOAD Dec 13 02:04:08.146000 audit[3354]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003c23e8 items=0 ppid=2545 pid=3354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:08.146000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163373263343165666164643561663465323563393236353864346665 Dec 13 02:04:08.146000 audit[3354]: AVC avc: denied { bpf } for pid=3354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.146000 audit[3354]: AVC avc: denied { bpf } for pid=3354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.146000 audit[3354]: AVC avc: denied { perfmon } for pid=3354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.146000 audit[3354]: AVC avc: denied { perfmon } for pid=3354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.146000 audit[3354]: AVC avc: denied { perfmon } for pid=3354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.146000 audit[3354]: AVC avc: denied { perfmon } for pid=3354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.146000 audit[3354]: AVC avc: denied { perfmon } for pid=3354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.146000 audit[3354]: AVC avc: denied { bpf } for pid=3354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.146000 audit[3354]: AVC avc: denied { bpf } for pid=3354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.146000 audit: BPF prog-id=137 op=LOAD Dec 13 02:04:08.146000 audit[3354]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003c2438 items=0 ppid=2545 pid=3354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:08.146000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163373263343165666164643561663465323563393236353864346665 Dec 13 02:04:08.146000 audit: BPF prog-id=137 op=UNLOAD Dec 13 02:04:08.146000 audit: BPF prog-id=136 op=UNLOAD Dec 13 02:04:08.146000 audit[3354]: AVC avc: denied { bpf } for pid=3354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.146000 audit[3354]: AVC avc: denied { bpf } for pid=3354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.146000 audit[3354]: AVC avc: denied { bpf } for pid=3354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.146000 audit[3354]: AVC avc: denied { perfmon } for pid=3354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.146000 audit[3354]: AVC avc: denied { perfmon } for pid=3354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.146000 audit[3354]: AVC avc: denied { perfmon } for pid=3354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.146000 audit[3354]: AVC avc: denied { perfmon } for pid=3354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.146000 audit[3354]: AVC avc: denied { perfmon } for pid=3354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.146000 audit[3354]: AVC avc: denied { bpf } for pid=3354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.146000 audit[3354]: AVC avc: denied { bpf } for pid=3354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.146000 audit: BPF prog-id=138 op=LOAD Dec 13 02:04:08.146000 audit[3354]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003c24c8 items=0 ppid=2545 pid=3354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:08.146000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163373263343165666164643561663465323563393236353864346665 Dec 13 02:04:08.160870 env[1212]: time="2024-12-13T02:04:08.160823490Z" level=info msg="StartContainer for \"ac72c41efadd5af4e25c92658d4fe34952cb06a070f28f4fa887c33ee7d56550\" returns successfully" Dec 13 02:04:08.225825 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 02:04:08.225969 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 02:04:08.505940 env[1212]: time="2024-12-13T02:04:08.505865040Z" level=info msg="StopPodSandbox for \"2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6\"" Dec 13 02:04:08.506835 env[1212]: time="2024-12-13T02:04:08.506793071Z" level=info msg="StopPodSandbox for \"c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af\"" Dec 13 02:04:08.641430 env[1212]: 2024-12-13 02:04:08.565 [INFO][3446] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af" Dec 13 02:04:08.641430 env[1212]: 2024-12-13 02:04:08.565 [INFO][3446] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af" iface="eth0" netns="/var/run/netns/cni-db09e5a2-a4eb-4149-a1fc-26d6ec768670" Dec 13 02:04:08.641430 env[1212]: 2024-12-13 02:04:08.566 [INFO][3446] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af" iface="eth0" netns="/var/run/netns/cni-db09e5a2-a4eb-4149-a1fc-26d6ec768670" Dec 13 02:04:08.641430 env[1212]: 2024-12-13 02:04:08.566 [INFO][3446] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af" iface="eth0" netns="/var/run/netns/cni-db09e5a2-a4eb-4149-a1fc-26d6ec768670" Dec 13 02:04:08.641430 env[1212]: 2024-12-13 02:04:08.566 [INFO][3446] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af" Dec 13 02:04:08.641430 env[1212]: 2024-12-13 02:04:08.566 [INFO][3446] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af" Dec 13 02:04:08.641430 env[1212]: 2024-12-13 02:04:08.624 [INFO][3462] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af" HandleID="k8s-pod-network.c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af" Workload="localhost-k8s-calico--kube--controllers--784649585b--dmq4n-eth0" Dec 13 02:04:08.641430 env[1212]: 2024-12-13 02:04:08.624 [INFO][3462] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:04:08.641430 env[1212]: 2024-12-13 02:04:08.624 [INFO][3462] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:04:08.641430 env[1212]: 2024-12-13 02:04:08.635 [WARNING][3462] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af" HandleID="k8s-pod-network.c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af" Workload="localhost-k8s-calico--kube--controllers--784649585b--dmq4n-eth0" Dec 13 02:04:08.641430 env[1212]: 2024-12-13 02:04:08.635 [INFO][3462] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af" HandleID="k8s-pod-network.c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af" Workload="localhost-k8s-calico--kube--controllers--784649585b--dmq4n-eth0" Dec 13 02:04:08.641430 env[1212]: 2024-12-13 02:04:08.637 [INFO][3462] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:04:08.641430 env[1212]: 2024-12-13 02:04:08.639 [INFO][3446] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af" Dec 13 02:04:08.641997 env[1212]: time="2024-12-13T02:04:08.641608131Z" level=info msg="TearDown network for sandbox \"c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af\" successfully" Dec 13 02:04:08.641997 env[1212]: time="2024-12-13T02:04:08.641653236Z" level=info msg="StopPodSandbox for \"c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af\" returns successfully" Dec 13 02:04:08.642620 env[1212]: time="2024-12-13T02:04:08.642556821Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-784649585b-dmq4n,Uid:ba1c6a87-03d0-4fc7-8058-05b0fe24f8ff,Namespace:calico-system,Attempt:1,}" Dec 13 02:04:08.647925 env[1212]: 2024-12-13 02:04:08.562 [INFO][3447] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6" Dec 13 02:04:08.647925 env[1212]: 2024-12-13 02:04:08.562 [INFO][3447] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6" iface="eth0" netns="/var/run/netns/cni-ef356921-e686-7590-27ab-9f3096ff40db" Dec 13 02:04:08.647925 env[1212]: 2024-12-13 02:04:08.562 [INFO][3447] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6" iface="eth0" netns="/var/run/netns/cni-ef356921-e686-7590-27ab-9f3096ff40db" Dec 13 02:04:08.647925 env[1212]: 2024-12-13 02:04:08.563 [INFO][3447] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6" iface="eth0" netns="/var/run/netns/cni-ef356921-e686-7590-27ab-9f3096ff40db" Dec 13 02:04:08.647925 env[1212]: 2024-12-13 02:04:08.563 [INFO][3447] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6" Dec 13 02:04:08.647925 env[1212]: 2024-12-13 02:04:08.563 [INFO][3447] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6" Dec 13 02:04:08.647925 env[1212]: 2024-12-13 02:04:08.624 [INFO][3461] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6" HandleID="k8s-pod-network.2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6" Workload="localhost-k8s-calico--apiserver--7bffbb6c48--67kk2-eth0" Dec 13 02:04:08.647925 env[1212]: 2024-12-13 02:04:08.624 [INFO][3461] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:04:08.647925 env[1212]: 2024-12-13 02:04:08.637 [INFO][3461] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:04:08.647925 env[1212]: 2024-12-13 02:04:08.642 [WARNING][3461] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6" HandleID="k8s-pod-network.2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6" Workload="localhost-k8s-calico--apiserver--7bffbb6c48--67kk2-eth0" Dec 13 02:04:08.647925 env[1212]: 2024-12-13 02:04:08.642 [INFO][3461] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6" HandleID="k8s-pod-network.2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6" Workload="localhost-k8s-calico--apiserver--7bffbb6c48--67kk2-eth0" Dec 13 02:04:08.647925 env[1212]: 2024-12-13 02:04:08.644 [INFO][3461] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:04:08.647925 env[1212]: 2024-12-13 02:04:08.646 [INFO][3447] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6" Dec 13 02:04:08.648511 env[1212]: time="2024-12-13T02:04:08.648076798Z" level=info msg="TearDown network for sandbox \"2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6\" successfully" Dec 13 02:04:08.648511 env[1212]: time="2024-12-13T02:04:08.648123015Z" level=info msg="StopPodSandbox for \"2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6\" returns successfully" Dec 13 02:04:08.649068 env[1212]: time="2024-12-13T02:04:08.649015149Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7bffbb6c48-67kk2,Uid:591490e8-6d9f-4a88-89f8-2785413ddcdc,Namespace:calico-apiserver,Attempt:1,}" Dec 13 02:04:08.669256 systemd[1]: Started sshd@14-10.0.0.89:22-10.0.0.1:33218.service. Dec 13 02:04:08.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.89:22-10.0.0.1:33218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:08.670672 kernel: kauditd_printk_skb: 44 callbacks suppressed Dec 13 02:04:08.670731 kernel: audit: type=1130 audit(1734055448.667:1061): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.89:22-10.0.0.1:33218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:08.778000 audit[3478]: USER_ACCT pid=3478 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:08.782006 sshd[3478]: Accepted publickey for core from 10.0.0.1 port 33218 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:04:08.785903 kernel: audit: type=1101 audit(1734055448.778:1062): pid=3478 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:08.788900 sshd[3478]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:04:08.794922 systemd[1]: run-netns-cni\x2ddb09e5a2\x2da4eb\x2d4149\x2da1fc\x2d26d6ec768670.mount: Deactivated successfully. Dec 13 02:04:08.795028 systemd[1]: run-netns-cni\x2def356921\x2de686\x2d7590\x2d27ab\x2d9f3096ff40db.mount: Deactivated successfully. Dec 13 02:04:08.786000 audit[3478]: CRED_ACQ pid=3478 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:08.803310 systemd[1]: Started session-15.scope. Dec 13 02:04:08.806235 kernel: audit: type=1103 audit(1734055448.786:1063): pid=3478 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:08.806309 kernel: audit: type=1006 audit(1734055448.786:1064): pid=3478 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Dec 13 02:04:08.806349 kernel: audit: type=1300 audit(1734055448.786:1064): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe3e7dcc60 a2=3 a3=0 items=0 ppid=1 pid=3478 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:08.786000 audit[3478]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe3e7dcc60 a2=3 a3=0 items=0 ppid=1 pid=3478 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:08.805794 systemd-logind[1199]: New session 15 of user core. Dec 13 02:04:08.786000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:04:08.813928 kernel: audit: type=1327 audit(1734055448.786:1064): proctitle=737368643A20636F7265205B707269765D Dec 13 02:04:08.813000 audit[3478]: USER_START pid=3478 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:08.825315 kernel: audit: type=1105 audit(1734055448.813:1065): pid=3478 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:08.825429 kernel: audit: type=1103 audit(1734055448.815:1066): pid=3505 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:08.815000 audit[3505]: CRED_ACQ pid=3505 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:08.932168 systemd-networkd[1031]: calia9ec47c4d0c: Link UP Dec 13 02:04:08.938710 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:04:08.938833 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia9ec47c4d0c: link becomes ready Dec 13 02:04:08.938800 systemd-networkd[1031]: calia9ec47c4d0c: Gained carrier Dec 13 02:04:08.953675 env[1212]: 2024-12-13 02:04:08.807 [INFO][3483] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Dec 13 02:04:08.953675 env[1212]: 2024-12-13 02:04:08.826 [INFO][3483] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--784649585b--dmq4n-eth0 calico-kube-controllers-784649585b- calico-system ba1c6a87-03d0-4fc7-8058-05b0fe24f8ff 899 0 2024-12-13 02:03:35 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:784649585b projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-784649585b-dmq4n eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calia9ec47c4d0c [] []}} ContainerID="c70d8344fffe18c2d61329f7869fccae592a7b4d0af31aee093e6953569b165f" Namespace="calico-system" Pod="calico-kube-controllers-784649585b-dmq4n" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--784649585b--dmq4n-" Dec 13 02:04:08.953675 env[1212]: 2024-12-13 02:04:08.826 [INFO][3483] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="c70d8344fffe18c2d61329f7869fccae592a7b4d0af31aee093e6953569b165f" Namespace="calico-system" Pod="calico-kube-controllers-784649585b-dmq4n" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--784649585b--dmq4n-eth0" Dec 13 02:04:08.953675 env[1212]: 2024-12-13 02:04:08.869 [INFO][3508] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c70d8344fffe18c2d61329f7869fccae592a7b4d0af31aee093e6953569b165f" HandleID="k8s-pod-network.c70d8344fffe18c2d61329f7869fccae592a7b4d0af31aee093e6953569b165f" Workload="localhost-k8s-calico--kube--controllers--784649585b--dmq4n-eth0" Dec 13 02:04:08.953675 env[1212]: 2024-12-13 02:04:08.878 [INFO][3508] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c70d8344fffe18c2d61329f7869fccae592a7b4d0af31aee093e6953569b165f" HandleID="k8s-pod-network.c70d8344fffe18c2d61329f7869fccae592a7b4d0af31aee093e6953569b165f" Workload="localhost-k8s-calico--kube--controllers--784649585b--dmq4n-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0004b3040), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-784649585b-dmq4n", "timestamp":"2024-12-13 02:04:08.869767759 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:04:08.953675 env[1212]: 2024-12-13 02:04:08.878 [INFO][3508] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:04:08.953675 env[1212]: 2024-12-13 02:04:08.878 [INFO][3508] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:04:08.953675 env[1212]: 2024-12-13 02:04:08.878 [INFO][3508] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 02:04:08.953675 env[1212]: 2024-12-13 02:04:08.880 [INFO][3508] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c70d8344fffe18c2d61329f7869fccae592a7b4d0af31aee093e6953569b165f" host="localhost" Dec 13 02:04:08.953675 env[1212]: 2024-12-13 02:04:08.884 [INFO][3508] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 02:04:08.953675 env[1212]: 2024-12-13 02:04:08.892 [INFO][3508] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 02:04:08.953675 env[1212]: 2024-12-13 02:04:08.895 [INFO][3508] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 02:04:08.953675 env[1212]: 2024-12-13 02:04:08.899 [INFO][3508] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 02:04:08.953675 env[1212]: 2024-12-13 02:04:08.899 [INFO][3508] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.c70d8344fffe18c2d61329f7869fccae592a7b4d0af31aee093e6953569b165f" host="localhost" Dec 13 02:04:08.953675 env[1212]: 2024-12-13 02:04:08.900 [INFO][3508] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.c70d8344fffe18c2d61329f7869fccae592a7b4d0af31aee093e6953569b165f Dec 13 02:04:08.953675 env[1212]: 2024-12-13 02:04:08.907 [INFO][3508] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.c70d8344fffe18c2d61329f7869fccae592a7b4d0af31aee093e6953569b165f" host="localhost" Dec 13 02:04:08.953675 env[1212]: 2024-12-13 02:04:08.916 [INFO][3508] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.c70d8344fffe18c2d61329f7869fccae592a7b4d0af31aee093e6953569b165f" host="localhost" Dec 13 02:04:08.953675 env[1212]: 2024-12-13 02:04:08.916 [INFO][3508] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.c70d8344fffe18c2d61329f7869fccae592a7b4d0af31aee093e6953569b165f" host="localhost" Dec 13 02:04:08.953675 env[1212]: 2024-12-13 02:04:08.916 [INFO][3508] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:04:08.953675 env[1212]: 2024-12-13 02:04:08.916 [INFO][3508] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="c70d8344fffe18c2d61329f7869fccae592a7b4d0af31aee093e6953569b165f" HandleID="k8s-pod-network.c70d8344fffe18c2d61329f7869fccae592a7b4d0af31aee093e6953569b165f" Workload="localhost-k8s-calico--kube--controllers--784649585b--dmq4n-eth0" Dec 13 02:04:08.954503 env[1212]: 2024-12-13 02:04:08.920 [INFO][3483] cni-plugin/k8s.go 386: Populated endpoint ContainerID="c70d8344fffe18c2d61329f7869fccae592a7b4d0af31aee093e6953569b165f" Namespace="calico-system" Pod="calico-kube-controllers-784649585b-dmq4n" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--784649585b--dmq4n-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--784649585b--dmq4n-eth0", GenerateName:"calico-kube-controllers-784649585b-", Namespace:"calico-system", SelfLink:"", UID:"ba1c6a87-03d0-4fc7-8058-05b0fe24f8ff", ResourceVersion:"899", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 3, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"784649585b", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-784649585b-dmq4n", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calia9ec47c4d0c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:04:08.954503 env[1212]: 2024-12-13 02:04:08.920 [INFO][3483] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="c70d8344fffe18c2d61329f7869fccae592a7b4d0af31aee093e6953569b165f" Namespace="calico-system" Pod="calico-kube-controllers-784649585b-dmq4n" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--784649585b--dmq4n-eth0" Dec 13 02:04:08.954503 env[1212]: 2024-12-13 02:04:08.921 [INFO][3483] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calia9ec47c4d0c ContainerID="c70d8344fffe18c2d61329f7869fccae592a7b4d0af31aee093e6953569b165f" Namespace="calico-system" Pod="calico-kube-controllers-784649585b-dmq4n" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--784649585b--dmq4n-eth0" Dec 13 02:04:08.954503 env[1212]: 2024-12-13 02:04:08.940 [INFO][3483] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c70d8344fffe18c2d61329f7869fccae592a7b4d0af31aee093e6953569b165f" Namespace="calico-system" Pod="calico-kube-controllers-784649585b-dmq4n" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--784649585b--dmq4n-eth0" Dec 13 02:04:08.954503 env[1212]: 2024-12-13 02:04:08.941 [INFO][3483] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="c70d8344fffe18c2d61329f7869fccae592a7b4d0af31aee093e6953569b165f" Namespace="calico-system" Pod="calico-kube-controllers-784649585b-dmq4n" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--784649585b--dmq4n-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--784649585b--dmq4n-eth0", GenerateName:"calico-kube-controllers-784649585b-", Namespace:"calico-system", SelfLink:"", UID:"ba1c6a87-03d0-4fc7-8058-05b0fe24f8ff", ResourceVersion:"899", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 3, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"784649585b", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c70d8344fffe18c2d61329f7869fccae592a7b4d0af31aee093e6953569b165f", Pod:"calico-kube-controllers-784649585b-dmq4n", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calia9ec47c4d0c", MAC:"ea:1b:58:e1:bc:68", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:04:08.954503 env[1212]: 2024-12-13 02:04:08.951 [INFO][3483] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="c70d8344fffe18c2d61329f7869fccae592a7b4d0af31aee093e6953569b165f" Namespace="calico-system" Pod="calico-kube-controllers-784649585b-dmq4n" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--784649585b--dmq4n-eth0" Dec 13 02:04:08.953952 sshd[3478]: pam_unix(sshd:session): session closed for user core Dec 13 02:04:08.953000 audit[3478]: USER_END pid=3478 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:08.956454 systemd[1]: sshd@14-10.0.0.89:22-10.0.0.1:33218.service: Deactivated successfully. Dec 13 02:04:08.957094 systemd[1]: session-15.scope: Deactivated successfully. Dec 13 02:04:08.958455 systemd-logind[1199]: Session 15 logged out. Waiting for processes to exit. Dec 13 02:04:08.959178 systemd-logind[1199]: Removed session 15. Dec 13 02:04:08.962795 kernel: audit: type=1106 audit(1734055448.953:1067): pid=3478 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:08.962856 kernel: audit: type=1104 audit(1734055448.953:1068): pid=3478 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:08.953000 audit[3478]: CRED_DISP pid=3478 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:08.954000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.89:22-10.0.0.1:33218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:08.963006 systemd-networkd[1031]: calib6999c1257d: Link UP Dec 13 02:04:08.965056 systemd-networkd[1031]: calib6999c1257d: Gained carrier Dec 13 02:04:08.965900 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib6999c1257d: link becomes ready Dec 13 02:04:08.978802 env[1212]: 2024-12-13 02:04:08.836 [INFO][3481] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Dec 13 02:04:08.978802 env[1212]: 2024-12-13 02:04:08.851 [INFO][3481] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--7bffbb6c48--67kk2-eth0 calico-apiserver-7bffbb6c48- calico-apiserver 591490e8-6d9f-4a88-89f8-2785413ddcdc 898 0 2024-12-13 02:03:35 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7bffbb6c48 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-7bffbb6c48-67kk2 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calib6999c1257d [] []}} ContainerID="c5425d877dba5a3f3b8f737e22398717e30351069855f064bfc0f1dae090393a" Namespace="calico-apiserver" Pod="calico-apiserver-7bffbb6c48-67kk2" WorkloadEndpoint="localhost-k8s-calico--apiserver--7bffbb6c48--67kk2-" Dec 13 02:04:08.978802 env[1212]: 2024-12-13 02:04:08.851 [INFO][3481] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="c5425d877dba5a3f3b8f737e22398717e30351069855f064bfc0f1dae090393a" Namespace="calico-apiserver" Pod="calico-apiserver-7bffbb6c48-67kk2" WorkloadEndpoint="localhost-k8s-calico--apiserver--7bffbb6c48--67kk2-eth0" Dec 13 02:04:08.978802 env[1212]: 2024-12-13 02:04:08.883 [INFO][3515] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c5425d877dba5a3f3b8f737e22398717e30351069855f064bfc0f1dae090393a" HandleID="k8s-pod-network.c5425d877dba5a3f3b8f737e22398717e30351069855f064bfc0f1dae090393a" Workload="localhost-k8s-calico--apiserver--7bffbb6c48--67kk2-eth0" Dec 13 02:04:08.978802 env[1212]: 2024-12-13 02:04:08.892 [INFO][3515] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c5425d877dba5a3f3b8f737e22398717e30351069855f064bfc0f1dae090393a" HandleID="k8s-pod-network.c5425d877dba5a3f3b8f737e22398717e30351069855f064bfc0f1dae090393a" Workload="localhost-k8s-calico--apiserver--7bffbb6c48--67kk2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003398c0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-7bffbb6c48-67kk2", "timestamp":"2024-12-13 02:04:08.883146082 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:04:08.978802 env[1212]: 2024-12-13 02:04:08.892 [INFO][3515] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:04:08.978802 env[1212]: 2024-12-13 02:04:08.916 [INFO][3515] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:04:08.978802 env[1212]: 2024-12-13 02:04:08.916 [INFO][3515] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 02:04:08.978802 env[1212]: 2024-12-13 02:04:08.919 [INFO][3515] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c5425d877dba5a3f3b8f737e22398717e30351069855f064bfc0f1dae090393a" host="localhost" Dec 13 02:04:08.978802 env[1212]: 2024-12-13 02:04:08.924 [INFO][3515] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 02:04:08.978802 env[1212]: 2024-12-13 02:04:08.931 [INFO][3515] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 02:04:08.978802 env[1212]: 2024-12-13 02:04:08.934 [INFO][3515] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 02:04:08.978802 env[1212]: 2024-12-13 02:04:08.938 [INFO][3515] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 02:04:08.978802 env[1212]: 2024-12-13 02:04:08.938 [INFO][3515] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.c5425d877dba5a3f3b8f737e22398717e30351069855f064bfc0f1dae090393a" host="localhost" Dec 13 02:04:08.978802 env[1212]: 2024-12-13 02:04:08.940 [INFO][3515] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.c5425d877dba5a3f3b8f737e22398717e30351069855f064bfc0f1dae090393a Dec 13 02:04:08.978802 env[1212]: 2024-12-13 02:04:08.946 [INFO][3515] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.c5425d877dba5a3f3b8f737e22398717e30351069855f064bfc0f1dae090393a" host="localhost" Dec 13 02:04:08.978802 env[1212]: 2024-12-13 02:04:08.954 [INFO][3515] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.c5425d877dba5a3f3b8f737e22398717e30351069855f064bfc0f1dae090393a" host="localhost" Dec 13 02:04:08.978802 env[1212]: 2024-12-13 02:04:08.954 [INFO][3515] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.c5425d877dba5a3f3b8f737e22398717e30351069855f064bfc0f1dae090393a" host="localhost" Dec 13 02:04:08.978802 env[1212]: 2024-12-13 02:04:08.954 [INFO][3515] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:04:08.978802 env[1212]: 2024-12-13 02:04:08.954 [INFO][3515] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="c5425d877dba5a3f3b8f737e22398717e30351069855f064bfc0f1dae090393a" HandleID="k8s-pod-network.c5425d877dba5a3f3b8f737e22398717e30351069855f064bfc0f1dae090393a" Workload="localhost-k8s-calico--apiserver--7bffbb6c48--67kk2-eth0" Dec 13 02:04:08.979783 env[1212]: 2024-12-13 02:04:08.956 [INFO][3481] cni-plugin/k8s.go 386: Populated endpoint ContainerID="c5425d877dba5a3f3b8f737e22398717e30351069855f064bfc0f1dae090393a" Namespace="calico-apiserver" Pod="calico-apiserver-7bffbb6c48-67kk2" WorkloadEndpoint="localhost-k8s-calico--apiserver--7bffbb6c48--67kk2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7bffbb6c48--67kk2-eth0", GenerateName:"calico-apiserver-7bffbb6c48-", Namespace:"calico-apiserver", SelfLink:"", UID:"591490e8-6d9f-4a88-89f8-2785413ddcdc", ResourceVersion:"898", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 3, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7bffbb6c48", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-7bffbb6c48-67kk2", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calib6999c1257d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:04:08.979783 env[1212]: 2024-12-13 02:04:08.960 [INFO][3481] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="c5425d877dba5a3f3b8f737e22398717e30351069855f064bfc0f1dae090393a" Namespace="calico-apiserver" Pod="calico-apiserver-7bffbb6c48-67kk2" WorkloadEndpoint="localhost-k8s-calico--apiserver--7bffbb6c48--67kk2-eth0" Dec 13 02:04:08.979783 env[1212]: 2024-12-13 02:04:08.960 [INFO][3481] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calib6999c1257d ContainerID="c5425d877dba5a3f3b8f737e22398717e30351069855f064bfc0f1dae090393a" Namespace="calico-apiserver" Pod="calico-apiserver-7bffbb6c48-67kk2" WorkloadEndpoint="localhost-k8s-calico--apiserver--7bffbb6c48--67kk2-eth0" Dec 13 02:04:08.979783 env[1212]: 2024-12-13 02:04:08.965 [INFO][3481] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c5425d877dba5a3f3b8f737e22398717e30351069855f064bfc0f1dae090393a" Namespace="calico-apiserver" Pod="calico-apiserver-7bffbb6c48-67kk2" WorkloadEndpoint="localhost-k8s-calico--apiserver--7bffbb6c48--67kk2-eth0" Dec 13 02:04:08.979783 env[1212]: 2024-12-13 02:04:08.965 [INFO][3481] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="c5425d877dba5a3f3b8f737e22398717e30351069855f064bfc0f1dae090393a" Namespace="calico-apiserver" Pod="calico-apiserver-7bffbb6c48-67kk2" WorkloadEndpoint="localhost-k8s-calico--apiserver--7bffbb6c48--67kk2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7bffbb6c48--67kk2-eth0", GenerateName:"calico-apiserver-7bffbb6c48-", Namespace:"calico-apiserver", SelfLink:"", UID:"591490e8-6d9f-4a88-89f8-2785413ddcdc", ResourceVersion:"898", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 3, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7bffbb6c48", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c5425d877dba5a3f3b8f737e22398717e30351069855f064bfc0f1dae090393a", Pod:"calico-apiserver-7bffbb6c48-67kk2", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calib6999c1257d", MAC:"c6:58:d1:d1:14:bb", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:04:08.979783 env[1212]: 2024-12-13 02:04:08.976 [INFO][3481] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="c5425d877dba5a3f3b8f737e22398717e30351069855f064bfc0f1dae090393a" Namespace="calico-apiserver" Pod="calico-apiserver-7bffbb6c48-67kk2" WorkloadEndpoint="localhost-k8s-calico--apiserver--7bffbb6c48--67kk2-eth0" Dec 13 02:04:08.979783 env[1212]: time="2024-12-13T02:04:08.979344213Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:04:08.979783 env[1212]: time="2024-12-13T02:04:08.979380582Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:04:08.979783 env[1212]: time="2024-12-13T02:04:08.979389649Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:04:08.979783 env[1212]: time="2024-12-13T02:04:08.979496780Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c70d8344fffe18c2d61329f7869fccae592a7b4d0af31aee093e6953569b165f pid=3554 runtime=io.containerd.runc.v2 Dec 13 02:04:08.994920 kubelet[2056]: E1213 02:04:08.990355 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:04:09.002734 systemd[1]: Started cri-containerd-c70d8344fffe18c2d61329f7869fccae592a7b4d0af31aee093e6953569b165f.scope. Dec 13 02:04:09.008039 kubelet[2056]: I1213 02:04:09.007311 2056 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-m42bx" podStartSLOduration=3.690822669 podStartE2EDuration="34.007289818s" podCreationTimestamp="2024-12-13 02:03:35 +0000 UTC" firstStartedPulling="2024-12-13 02:03:37.466586207 +0000 UTC m=+25.045271211" lastFinishedPulling="2024-12-13 02:04:07.783053356 +0000 UTC m=+55.361738360" observedRunningTime="2024-12-13 02:04:09.007100193 +0000 UTC m=+56.585785227" watchObservedRunningTime="2024-12-13 02:04:09.007289818 +0000 UTC m=+56.585974822" Dec 13 02:04:09.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.016000 audit: BPF prog-id=139 op=LOAD Dec 13 02:04:09.021000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.021000 audit[3569]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=3554 pid=3569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.021000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337306438333434666666653138633264363133323966373836396663 Dec 13 02:04:09.021000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.021000 audit[3569]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=3554 pid=3569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.021000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337306438333434666666653138633264363133323966373836396663 Dec 13 02:04:09.021000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.021000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.021000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.021000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.021000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.021000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.021000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.021000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.021000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.021000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.021000 audit: BPF prog-id=140 op=LOAD Dec 13 02:04:09.021000 audit[3569]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c00039a930 items=0 ppid=3554 pid=3569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.021000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337306438333434666666653138633264363133323966373836396663 Dec 13 02:04:09.021000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.021000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.021000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.021000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.021000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.021000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.021000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.021000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.021000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.021000 audit: BPF prog-id=141 op=LOAD Dec 13 02:04:09.021000 audit[3569]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c00039a978 items=0 ppid=3554 pid=3569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.021000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337306438333434666666653138633264363133323966373836396663 Dec 13 02:04:09.021000 audit: BPF prog-id=141 op=UNLOAD Dec 13 02:04:09.021000 audit: BPF prog-id=140 op=UNLOAD Dec 13 02:04:09.021000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.021000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.021000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.021000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.021000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.021000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.021000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.021000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.021000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.021000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.021000 audit: BPF prog-id=142 op=LOAD Dec 13 02:04:09.021000 audit[3569]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c00039ad88 items=0 ppid=3554 pid=3569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.021000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337306438333434666666653138633264363133323966373836396663 Dec 13 02:04:09.024663 env[1212]: time="2024-12-13T02:04:09.016594577Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:04:09.024663 env[1212]: time="2024-12-13T02:04:09.016663807Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:04:09.024663 env[1212]: time="2024-12-13T02:04:09.016709983Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:04:09.024663 env[1212]: time="2024-12-13T02:04:09.016946387Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c5425d877dba5a3f3b8f737e22398717e30351069855f064bfc0f1dae090393a pid=3603 runtime=io.containerd.runc.v2 Dec 13 02:04:09.024459 systemd-resolved[1144]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 02:04:09.035621 systemd[1]: Started cri-containerd-c5425d877dba5a3f3b8f737e22398717e30351069855f064bfc0f1dae090393a.scope. Dec 13 02:04:09.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.056000 audit: BPF prog-id=143 op=LOAD Dec 13 02:04:09.057000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.057000 audit[3614]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=3603 pid=3614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.057000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335343235643837376462613561336633623866373337653232333938 Dec 13 02:04:09.057000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.057000 audit[3614]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019f6b0 a2=3c a3=c items=0 ppid=3603 pid=3614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.057000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335343235643837376462613561336633623866373337653232333938 Dec 13 02:04:09.057000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.057000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.057000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.057000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.057000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.057000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.057000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.057000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.057000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.057000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.057000 audit: BPF prog-id=144 op=LOAD Dec 13 02:04:09.057000 audit[3614]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019f9d8 a2=78 a3=c000391b40 items=0 ppid=3603 pid=3614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.057000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335343235643837376462613561336633623866373337653232333938 Dec 13 02:04:09.057000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.057000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.057000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.057000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.057000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.057000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.057000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.057000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.057000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.057000 audit: BPF prog-id=145 op=LOAD Dec 13 02:04:09.057000 audit[3614]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019f770 a2=78 a3=c000391b88 items=0 ppid=3603 pid=3614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.057000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335343235643837376462613561336633623866373337653232333938 Dec 13 02:04:09.057000 audit: BPF prog-id=145 op=UNLOAD Dec 13 02:04:09.057000 audit: BPF prog-id=144 op=UNLOAD Dec 13 02:04:09.057000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.057000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.057000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.057000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.057000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.057000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.057000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.057000 audit[3614]: AVC avc: denied { perfmon } for pid=3614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.057000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.057000 audit[3614]: AVC avc: denied { bpf } for pid=3614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.057000 audit: BPF prog-id=146 op=LOAD Dec 13 02:04:09.057000 audit[3614]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019fc30 a2=78 a3=c000391f98 items=0 ppid=3603 pid=3614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.057000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335343235643837376462613561336633623866373337653232333938 Dec 13 02:04:09.060264 systemd-resolved[1144]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 02:04:09.079188 env[1212]: time="2024-12-13T02:04:09.079142795Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-784649585b-dmq4n,Uid:ba1c6a87-03d0-4fc7-8058-05b0fe24f8ff,Namespace:calico-system,Attempt:1,} returns sandbox id \"c70d8344fffe18c2d61329f7869fccae592a7b4d0af31aee093e6953569b165f\"" Dec 13 02:04:09.080827 env[1212]: time="2024-12-13T02:04:09.080794074Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 13 02:04:09.092542 env[1212]: time="2024-12-13T02:04:09.092496220Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7bffbb6c48-67kk2,Uid:591490e8-6d9f-4a88-89f8-2785413ddcdc,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"c5425d877dba5a3f3b8f737e22398717e30351069855f064bfc0f1dae090393a\"" Dec 13 02:04:09.458000 audit[3708]: AVC avc: denied { write } for pid=3708 comm="tee" name="fd" dev="proc" ino=26086 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:04:09.458000 audit[3708]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffc5716a26 a2=241 a3=1b6 items=1 ppid=3672 pid=3708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.458000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 02:04:09.458000 audit: PATH item=0 name="/dev/fd/63" inode=26794 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:09.458000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:04:09.465000 audit[3711]: AVC avc: denied { write } for pid=3711 comm="tee" name="fd" dev="proc" ino=26797 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:04:09.465000 audit[3711]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd1bfd6a28 a2=241 a3=1b6 items=1 ppid=3665 pid=3711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.465000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 02:04:09.465000 audit: PATH item=0 name="/dev/fd/63" inode=23465 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:09.465000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:04:09.474000 audit[3717]: AVC avc: denied { write } for pid=3717 comm="tee" name="fd" dev="proc" ino=23471 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:04:09.476000 audit[3706]: AVC avc: denied { write } for pid=3706 comm="tee" name="fd" dev="proc" ino=25557 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:04:09.474000 audit[3717]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffedd04a26 a2=241 a3=1b6 items=1 ppid=3678 pid=3717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.474000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 02:04:09.474000 audit: PATH item=0 name="/dev/fd/63" inode=23466 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:09.474000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:04:09.480000 audit[3712]: AVC avc: denied { write } for pid=3712 comm="tee" name="fd" dev="proc" ino=25560 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:04:09.480000 audit[3712]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc05e46a26 a2=241 a3=1b6 items=1 ppid=3675 pid=3712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.480000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 02:04:09.480000 audit: PATH item=0 name="/dev/fd/63" inode=25548 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:09.480000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:04:09.476000 audit[3706]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff9ff36a16 a2=241 a3=1b6 items=1 ppid=3677 pid=3706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.476000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 02:04:09.476000 audit: PATH item=0 name="/dev/fd/63" inode=25545 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:09.476000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:04:09.481000 audit[3739]: AVC avc: denied { write } for pid=3739 comm="tee" name="fd" dev="proc" ino=26096 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:04:09.481000 audit[3739]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffef1131a27 a2=241 a3=1b6 items=1 ppid=3666 pid=3739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.481000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 02:04:09.481000 audit: PATH item=0 name="/dev/fd/63" inode=23468 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:09.481000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:04:09.490000 audit[3747]: AVC avc: denied { write } for pid=3747 comm="tee" name="fd" dev="proc" ino=26802 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:04:09.490000 audit[3747]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcacf68a17 a2=241 a3=1b6 items=1 ppid=3667 pid=3747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.490000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 02:04:09.490000 audit: PATH item=0 name="/dev/fd/63" inode=23476 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:09.490000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:04:09.629000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.629000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.629000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.629000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.629000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.629000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.629000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.629000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.629000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.629000 audit: BPF prog-id=147 op=LOAD Dec 13 02:04:09.629000 audit[3784]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffcb0d7160 a2=98 a3=3 items=0 ppid=3679 pid=3784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.629000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:04:09.630000 audit: BPF prog-id=147 op=UNLOAD Dec 13 02:04:09.630000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.630000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.630000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.630000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.630000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.630000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.630000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.630000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.630000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.630000 audit: BPF prog-id=148 op=LOAD Dec 13 02:04:09.630000 audit[3784]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffcb0d6f40 a2=74 a3=540051 items=0 ppid=3679 pid=3784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.630000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:04:09.630000 audit: BPF prog-id=148 op=UNLOAD Dec 13 02:04:09.630000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.630000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.630000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.630000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.630000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.630000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.630000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.630000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.630000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.630000 audit: BPF prog-id=149 op=LOAD Dec 13 02:04:09.630000 audit[3784]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffcb0d6f70 a2=94 a3=2 items=0 ppid=3679 pid=3784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.630000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:04:09.630000 audit: BPF prog-id=149 op=UNLOAD Dec 13 02:04:09.667000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c5,c616 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:04:09.667000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=8230 scontext=system_u:system_r:svirt_lxc_net_t:s0:c5,c616 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:04:09.667000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c5,c616 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:04:09.667000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c01068e720 a2=fc6 a3=0 items=0 ppid=1752 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c5,c616 key=(null) Dec 13 02:04:09.667000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c0104d63f0 a2=fc6 a3=0 items=0 ppid=1752 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c5,c616 key=(null) Dec 13 02:04:09.667000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c00ef536e0 a2=fc6 a3=0 items=0 ppid=1752 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c5,c616 key=(null) Dec 13 02:04:09.667000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 02:04:09.667000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 02:04:09.667000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 02:04:09.667000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8228 scontext=system_u:system_r:svirt_lxc_net_t:s0:c5,c616 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:04:09.667000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00e8bc460 a2=fc6 a3=0 items=0 ppid=1752 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c5,c616 key=(null) Dec 13 02:04:09.667000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 02:04:09.667000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c5,c616 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:04:09.667000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c0104d6420 a2=fc6 a3=0 items=0 ppid=1752 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c5,c616 key=(null) Dec 13 02:04:09.667000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 02:04:09.668000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8228 scontext=system_u:system_r:svirt_lxc_net_t:s0:c5,c616 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:04:09.668000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00e8bc480 a2=fc6 a3=0 items=0 ppid=1752 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c5,c616 key=(null) Dec 13 02:04:09.668000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 02:04:09.730000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c279,c502 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:04:09.730000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8228 scontext=system_u:system_r:svirt_lxc_net_t:s0:c279,c502 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:04:09.730000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000d1b860 a2=fc6 a3=0 items=0 ppid=1800 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c279,c502 key=(null) Dec 13 02:04:09.730000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f03840 a2=fc6 a3=0 items=0 ppid=1800 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c279,c502 key=(null) Dec 13 02:04:09.730000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:04:09.730000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:04:09.745000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.745000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.745000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.745000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.745000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.745000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.745000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.745000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.745000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.745000 audit: BPF prog-id=150 op=LOAD Dec 13 02:04:09.745000 audit[3784]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffcb0d6e30 a2=40 a3=1 items=0 ppid=3679 pid=3784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.745000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:04:09.746000 audit: BPF prog-id=150 op=UNLOAD Dec 13 02:04:09.746000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.746000 audit[3784]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fffcb0d6f00 a2=50 a3=7fffcb0d6fe0 items=0 ppid=3679 pid=3784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.746000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:04:09.753000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.753000 audit[3784]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffcb0d6e40 a2=28 a3=0 items=0 ppid=3679 pid=3784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.753000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:04:09.753000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.753000 audit[3784]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffcb0d6e70 a2=28 a3=0 items=0 ppid=3679 pid=3784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.753000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:04:09.753000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.753000 audit[3784]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffcb0d6d80 a2=28 a3=0 items=0 ppid=3679 pid=3784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.753000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:04:09.753000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.753000 audit[3784]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffcb0d6e90 a2=28 a3=0 items=0 ppid=3679 pid=3784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.753000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:04:09.753000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.753000 audit[3784]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffcb0d6e70 a2=28 a3=0 items=0 ppid=3679 pid=3784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.753000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:04:09.753000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.753000 audit[3784]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffcb0d6e60 a2=28 a3=0 items=0 ppid=3679 pid=3784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.753000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:04:09.753000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.753000 audit[3784]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffcb0d6e90 a2=28 a3=0 items=0 ppid=3679 pid=3784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.753000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:04:09.753000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.753000 audit[3784]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffcb0d6e70 a2=28 a3=0 items=0 ppid=3679 pid=3784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.753000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:04:09.753000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.753000 audit[3784]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffcb0d6e90 a2=28 a3=0 items=0 ppid=3679 pid=3784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.753000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:04:09.753000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.753000 audit[3784]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffcb0d6e60 a2=28 a3=0 items=0 ppid=3679 pid=3784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.753000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:04:09.753000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.753000 audit[3784]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffcb0d6ed0 a2=28 a3=0 items=0 ppid=3679 pid=3784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.753000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:04:09.754000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.754000 audit[3784]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffcb0d6c80 a2=50 a3=1 items=0 ppid=3679 pid=3784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.754000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:04:09.754000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.754000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.754000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.754000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.754000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.754000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.754000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.754000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.754000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.754000 audit: BPF prog-id=151 op=LOAD Dec 13 02:04:09.754000 audit[3784]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffcb0d6c80 a2=94 a3=5 items=0 ppid=3679 pid=3784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.754000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:04:09.754000 audit: BPF prog-id=151 op=UNLOAD Dec 13 02:04:09.754000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.754000 audit[3784]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffcb0d6d30 a2=50 a3=1 items=0 ppid=3679 pid=3784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.754000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:04:09.754000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.754000 audit[3784]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fffcb0d6e50 a2=4 a3=38 items=0 ppid=3679 pid=3784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.754000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:04:09.754000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.754000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.754000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.754000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.754000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.754000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.754000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.754000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.754000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.754000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.754000 audit[3784]: AVC avc: denied { confidentiality } for pid=3784 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:04:09.754000 audit[3784]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffcb0d6ea0 a2=94 a3=6 items=0 ppid=3679 pid=3784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.754000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:04:09.754000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.754000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.754000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.754000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.754000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.754000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.754000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.754000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.754000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.754000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.754000 audit[3784]: AVC avc: denied { confidentiality } for pid=3784 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:04:09.754000 audit[3784]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffcb0d6650 a2=94 a3=83 items=0 ppid=3679 pid=3784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.754000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:04:09.754000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.754000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.754000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.754000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.754000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.754000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.754000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.754000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.754000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.754000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.754000 audit[3784]: AVC avc: denied { confidentiality } for pid=3784 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:04:09.754000 audit[3784]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffcb0d6650 a2=94 a3=83 items=0 ppid=3679 pid=3784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.754000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:04:09.762000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.762000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.762000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.762000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.762000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.762000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.762000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.762000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.762000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.762000 audit: BPF prog-id=152 op=LOAD Dec 13 02:04:09.762000 audit[3787]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff60101050 a2=98 a3=1999999999999999 items=0 ppid=3679 pid=3787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.762000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:04:09.762000 audit: BPF prog-id=152 op=UNLOAD Dec 13 02:04:09.762000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.762000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.762000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.762000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.762000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.762000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.762000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.762000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.762000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.762000 audit: BPF prog-id=153 op=LOAD Dec 13 02:04:09.762000 audit[3787]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff60100f30 a2=74 a3=ffff items=0 ppid=3679 pid=3787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.762000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:04:09.762000 audit: BPF prog-id=153 op=UNLOAD Dec 13 02:04:09.762000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.762000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.762000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.762000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.762000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.762000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.762000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.762000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.762000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.762000 audit: BPF prog-id=154 op=LOAD Dec 13 02:04:09.762000 audit[3787]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff60100f70 a2=40 a3=7fff60101150 items=0 ppid=3679 pid=3787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.762000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:04:09.762000 audit: BPF prog-id=154 op=UNLOAD Dec 13 02:04:09.789337 systemd[1]: run-containerd-runc-k8s.io-ac72c41efadd5af4e25c92658d4fe34952cb06a070f28f4fa887c33ee7d56550-runc.q9xe65.mount: Deactivated successfully. Dec 13 02:04:09.808967 systemd-networkd[1031]: vxlan.calico: Link UP Dec 13 02:04:09.808975 systemd-networkd[1031]: vxlan.calico: Gained carrier Dec 13 02:04:09.821000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.821000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.821000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.821000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.821000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.821000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.821000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.821000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.821000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.821000 audit: BPF prog-id=155 op=LOAD Dec 13 02:04:09.821000 audit[3812]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff06709610 a2=98 a3=ffffffff items=0 ppid=3679 pid=3812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.821000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:04:09.821000 audit: BPF prog-id=155 op=UNLOAD Dec 13 02:04:09.821000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.821000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.821000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.821000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.821000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.821000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.821000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.821000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.821000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.821000 audit: BPF prog-id=156 op=LOAD Dec 13 02:04:09.821000 audit[3812]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff06709420 a2=74 a3=540051 items=0 ppid=3679 pid=3812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.821000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:04:09.821000 audit: BPF prog-id=156 op=UNLOAD Dec 13 02:04:09.821000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.821000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.821000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.821000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.821000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.821000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.821000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.821000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.821000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.821000 audit: BPF prog-id=157 op=LOAD Dec 13 02:04:09.821000 audit[3812]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff06709450 a2=94 a3=2 items=0 ppid=3679 pid=3812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.821000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:04:09.821000 audit: BPF prog-id=157 op=UNLOAD Dec 13 02:04:09.821000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.821000 audit[3812]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff06709320 a2=28 a3=0 items=0 ppid=3679 pid=3812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.821000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:04:09.821000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.821000 audit[3812]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff06709350 a2=28 a3=0 items=0 ppid=3679 pid=3812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.821000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:04:09.821000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.821000 audit[3812]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff06709260 a2=28 a3=0 items=0 ppid=3679 pid=3812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.821000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:04:09.821000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.821000 audit[3812]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff06709370 a2=28 a3=0 items=0 ppid=3679 pid=3812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.821000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:04:09.821000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.821000 audit[3812]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff06709350 a2=28 a3=0 items=0 ppid=3679 pid=3812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.821000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:04:09.821000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.821000 audit[3812]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff06709340 a2=28 a3=0 items=0 ppid=3679 pid=3812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.821000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:04:09.821000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.821000 audit[3812]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff06709370 a2=28 a3=0 items=0 ppid=3679 pid=3812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.821000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:04:09.821000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.821000 audit[3812]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff06709350 a2=28 a3=0 items=0 ppid=3679 pid=3812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.821000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:04:09.821000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.821000 audit[3812]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff06709370 a2=28 a3=0 items=0 ppid=3679 pid=3812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.821000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:04:09.821000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.821000 audit[3812]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff06709340 a2=28 a3=0 items=0 ppid=3679 pid=3812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.821000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:04:09.821000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.821000 audit[3812]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff067093b0 a2=28 a3=0 items=0 ppid=3679 pid=3812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.821000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:04:09.821000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.821000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.821000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.821000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.821000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.821000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.821000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.821000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.821000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.821000 audit: BPF prog-id=158 op=LOAD Dec 13 02:04:09.821000 audit[3812]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff06709220 a2=40 a3=0 items=0 ppid=3679 pid=3812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.821000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:04:09.821000 audit: BPF prog-id=158 op=UNLOAD Dec 13 02:04:09.822000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.822000 audit[3812]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fff06709210 a2=50 a3=2800 items=0 ppid=3679 pid=3812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.822000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:04:09.822000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.822000 audit[3812]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fff06709210 a2=50 a3=2800 items=0 ppid=3679 pid=3812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.822000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:04:09.822000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.822000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.822000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.822000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.822000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.822000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.822000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.822000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.822000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.822000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.822000 audit: BPF prog-id=159 op=LOAD Dec 13 02:04:09.822000 audit[3812]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff06708a30 a2=94 a3=2 items=0 ppid=3679 pid=3812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.822000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:04:09.822000 audit: BPF prog-id=159 op=UNLOAD Dec 13 02:04:09.822000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.822000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.822000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.822000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.822000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.822000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.822000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.822000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.822000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.822000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.822000 audit: BPF prog-id=160 op=LOAD Dec 13 02:04:09.822000 audit[3812]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff06708b30 a2=94 a3=2d items=0 ppid=3679 pid=3812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.822000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:04:09.830000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.830000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.830000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.830000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.830000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.830000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.830000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.830000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.830000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.830000 audit: BPF prog-id=161 op=LOAD Dec 13 02:04:09.830000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff724a1e60 a2=98 a3=0 items=0 ppid=3679 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.830000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:04:09.830000 audit: BPF prog-id=161 op=UNLOAD Dec 13 02:04:09.830000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.830000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.830000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.830000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.830000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.830000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.830000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.830000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.830000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.830000 audit: BPF prog-id=162 op=LOAD Dec 13 02:04:09.830000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff724a1c40 a2=74 a3=540051 items=0 ppid=3679 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.830000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:04:09.830000 audit: BPF prog-id=162 op=UNLOAD Dec 13 02:04:09.830000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.830000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.830000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.830000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.830000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.830000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.830000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.830000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.830000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.830000 audit: BPF prog-id=163 op=LOAD Dec 13 02:04:09.830000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff724a1c70 a2=94 a3=2 items=0 ppid=3679 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.830000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:04:09.831000 audit: BPF prog-id=163 op=UNLOAD Dec 13 02:04:09.939000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.939000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.939000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.939000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.939000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.939000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.939000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.939000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.939000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.939000 audit: BPF prog-id=164 op=LOAD Dec 13 02:04:09.939000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff724a1b30 a2=40 a3=1 items=0 ppid=3679 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.939000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:04:09.939000 audit: BPF prog-id=164 op=UNLOAD Dec 13 02:04:09.939000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.939000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff724a1c00 a2=50 a3=7fff724a1ce0 items=0 ppid=3679 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.939000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:04:09.946000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.946000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff724a1b40 a2=28 a3=0 items=0 ppid=3679 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.946000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:04:09.946000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.946000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff724a1b70 a2=28 a3=0 items=0 ppid=3679 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.946000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:04:09.946000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.946000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff724a1a80 a2=28 a3=0 items=0 ppid=3679 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.946000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:04:09.947000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.947000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff724a1b90 a2=28 a3=0 items=0 ppid=3679 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.947000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:04:09.947000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.947000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff724a1b70 a2=28 a3=0 items=0 ppid=3679 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.947000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:04:09.947000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.947000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff724a1b60 a2=28 a3=0 items=0 ppid=3679 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.947000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:04:09.947000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.947000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff724a1b90 a2=28 a3=0 items=0 ppid=3679 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.947000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:04:09.947000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.947000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff724a1b70 a2=28 a3=0 items=0 ppid=3679 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.947000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:04:09.947000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.947000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff724a1b90 a2=28 a3=0 items=0 ppid=3679 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.947000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:04:09.947000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.947000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff724a1b60 a2=28 a3=0 items=0 ppid=3679 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.947000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:04:09.947000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.947000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff724a1bd0 a2=28 a3=0 items=0 ppid=3679 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.947000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:04:09.947000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.947000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff724a1980 a2=50 a3=1 items=0 ppid=3679 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.947000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:04:09.947000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.947000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.947000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.947000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.947000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.947000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.947000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.947000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.947000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.947000 audit: BPF prog-id=165 op=LOAD Dec 13 02:04:09.947000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff724a1980 a2=94 a3=5 items=0 ppid=3679 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.947000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:04:09.947000 audit: BPF prog-id=165 op=UNLOAD Dec 13 02:04:09.947000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.947000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff724a1a30 a2=50 a3=1 items=0 ppid=3679 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.947000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:04:09.947000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.947000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff724a1b50 a2=4 a3=38 items=0 ppid=3679 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.947000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:04:09.947000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.947000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.947000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.947000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.947000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.947000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.947000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.947000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.947000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.947000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.947000 audit[3817]: AVC avc: denied { confidentiality } for pid=3817 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:04:09.947000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff724a1ba0 a2=94 a3=6 items=0 ppid=3679 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.947000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:04:09.947000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.947000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.947000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.947000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.947000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.947000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.947000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.947000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.947000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.947000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.947000 audit[3817]: AVC avc: denied { confidentiality } for pid=3817 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:04:09.947000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff724a1350 a2=94 a3=83 items=0 ppid=3679 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.947000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:04:09.948000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.948000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.948000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.948000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.948000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.948000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.948000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.948000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.948000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.948000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.948000 audit[3817]: AVC avc: denied { confidentiality } for pid=3817 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:04:09.948000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff724a1350 a2=94 a3=83 items=0 ppid=3679 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.948000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:04:09.948000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.948000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff724a2d90 a2=10 a3=208 items=0 ppid=3679 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.948000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:04:09.948000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.948000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff724a2c30 a2=10 a3=3 items=0 ppid=3679 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.948000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:04:09.948000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.948000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff724a2bd0 a2=10 a3=3 items=0 ppid=3679 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.948000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:04:09.948000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.948000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff724a2bd0 a2=10 a3=7 items=0 ppid=3679 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:09.948000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:04:09.956000 audit: BPF prog-id=160 op=UNLOAD Dec 13 02:04:09.995360 kubelet[2056]: E1213 02:04:09.995261 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:04:10.007014 systemd-networkd[1031]: calib6999c1257d: Gained IPv6LL Dec 13 02:04:10.012000 audit[3853]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=3853 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:04:10.012000 audit[3853]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffc2f569f00 a2=0 a3=7ffc2f569eec items=0 ppid=3679 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:10.012000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:04:10.014000 audit[3843]: NETFILTER_CFG table=nat:98 family=2 entries=15 op=nft_register_chain pid=3843 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:04:10.014000 audit[3843]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd523fdec0 a2=0 a3=7ffd523fdeac items=0 ppid=3679 pid=3843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:10.014000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:04:10.023000 audit[3852]: NETFILTER_CFG table=raw:99 family=2 entries=21 op=nft_register_chain pid=3852 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:04:10.023000 audit[3852]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffdeaad2420 a2=0 a3=7ffdeaad240c items=0 ppid=3679 pid=3852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:10.023000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:04:10.033346 systemd[1]: run-containerd-runc-k8s.io-ac72c41efadd5af4e25c92658d4fe34952cb06a070f28f4fa887c33ee7d56550-runc.NvHD5n.mount: Deactivated successfully. Dec 13 02:04:10.034000 audit[3859]: NETFILTER_CFG table=filter:100 family=2 entries=105 op=nft_register_chain pid=3859 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:04:10.034000 audit[3859]: SYSCALL arch=c000003e syscall=46 success=yes exit=58184 a0=3 a1=7fff638a4560 a2=0 a3=7fff638a454c items=0 ppid=3679 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:10.034000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:04:10.505381 env[1212]: time="2024-12-13T02:04:10.505338654Z" level=info msg="StopPodSandbox for \"b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e\"" Dec 13 02:04:10.506310 env[1212]: time="2024-12-13T02:04:10.506238359Z" level=info msg="StopPodSandbox for \"511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460\"" Dec 13 02:04:10.878644 env[1212]: 2024-12-13 02:04:10.673 [INFO][3913] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e" Dec 13 02:04:10.878644 env[1212]: 2024-12-13 02:04:10.673 [INFO][3913] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e" iface="eth0" netns="/var/run/netns/cni-32d25616-d548-632e-df60-f43778755090" Dec 13 02:04:10.878644 env[1212]: 2024-12-13 02:04:10.673 [INFO][3913] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e" iface="eth0" netns="/var/run/netns/cni-32d25616-d548-632e-df60-f43778755090" Dec 13 02:04:10.878644 env[1212]: 2024-12-13 02:04:10.673 [INFO][3913] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e" iface="eth0" netns="/var/run/netns/cni-32d25616-d548-632e-df60-f43778755090" Dec 13 02:04:10.878644 env[1212]: 2024-12-13 02:04:10.673 [INFO][3913] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e" Dec 13 02:04:10.878644 env[1212]: 2024-12-13 02:04:10.673 [INFO][3913] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e" Dec 13 02:04:10.878644 env[1212]: 2024-12-13 02:04:10.698 [INFO][3927] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e" HandleID="k8s-pod-network.b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e" Workload="localhost-k8s-csi--node--driver--wlj2f-eth0" Dec 13 02:04:10.878644 env[1212]: 2024-12-13 02:04:10.698 [INFO][3927] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:04:10.878644 env[1212]: 2024-12-13 02:04:10.698 [INFO][3927] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:04:10.878644 env[1212]: 2024-12-13 02:04:10.702 [WARNING][3927] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e" HandleID="k8s-pod-network.b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e" Workload="localhost-k8s-csi--node--driver--wlj2f-eth0" Dec 13 02:04:10.878644 env[1212]: 2024-12-13 02:04:10.702 [INFO][3927] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e" HandleID="k8s-pod-network.b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e" Workload="localhost-k8s-csi--node--driver--wlj2f-eth0" Dec 13 02:04:10.878644 env[1212]: 2024-12-13 02:04:10.875 [INFO][3927] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:04:10.878644 env[1212]: 2024-12-13 02:04:10.877 [INFO][3913] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e" Dec 13 02:04:10.881550 systemd[1]: run-netns-cni\x2d32d25616\x2dd548\x2d632e\x2ddf60\x2df43778755090.mount: Deactivated successfully. Dec 13 02:04:10.882845 env[1212]: time="2024-12-13T02:04:10.882797494Z" level=info msg="TearDown network for sandbox \"b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e\" successfully" Dec 13 02:04:10.882952 env[1212]: time="2024-12-13T02:04:10.882843904Z" level=info msg="StopPodSandbox for \"b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e\" returns successfully" Dec 13 02:04:10.883813 env[1212]: time="2024-12-13T02:04:10.883785830Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wlj2f,Uid:6caefe76-fe04-44c0-b43e-81fd39cda0c9,Namespace:calico-system,Attempt:1,}" Dec 13 02:04:10.890612 env[1212]: 2024-12-13 02:04:10.672 [INFO][3912] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460" Dec 13 02:04:10.890612 env[1212]: 2024-12-13 02:04:10.672 [INFO][3912] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460" iface="eth0" netns="/var/run/netns/cni-db4d03f7-9709-1fb3-50dc-a12e363db916" Dec 13 02:04:10.890612 env[1212]: 2024-12-13 02:04:10.673 [INFO][3912] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460" iface="eth0" netns="/var/run/netns/cni-db4d03f7-9709-1fb3-50dc-a12e363db916" Dec 13 02:04:10.890612 env[1212]: 2024-12-13 02:04:10.673 [INFO][3912] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460" iface="eth0" netns="/var/run/netns/cni-db4d03f7-9709-1fb3-50dc-a12e363db916" Dec 13 02:04:10.890612 env[1212]: 2024-12-13 02:04:10.673 [INFO][3912] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460" Dec 13 02:04:10.890612 env[1212]: 2024-12-13 02:04:10.673 [INFO][3912] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460" Dec 13 02:04:10.890612 env[1212]: 2024-12-13 02:04:10.705 [INFO][3928] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460" HandleID="k8s-pod-network.511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460" Workload="localhost-k8s-calico--apiserver--7bffbb6c48--lhwh7-eth0" Dec 13 02:04:10.890612 env[1212]: 2024-12-13 02:04:10.705 [INFO][3928] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:04:10.890612 env[1212]: 2024-12-13 02:04:10.875 [INFO][3928] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:04:10.890612 env[1212]: 2024-12-13 02:04:10.880 [WARNING][3928] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460" HandleID="k8s-pod-network.511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460" Workload="localhost-k8s-calico--apiserver--7bffbb6c48--lhwh7-eth0" Dec 13 02:04:10.890612 env[1212]: 2024-12-13 02:04:10.881 [INFO][3928] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460" HandleID="k8s-pod-network.511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460" Workload="localhost-k8s-calico--apiserver--7bffbb6c48--lhwh7-eth0" Dec 13 02:04:10.890612 env[1212]: 2024-12-13 02:04:10.882 [INFO][3928] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:04:10.890612 env[1212]: 2024-12-13 02:04:10.888 [INFO][3912] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460" Dec 13 02:04:10.891278 env[1212]: time="2024-12-13T02:04:10.890765960Z" level=info msg="TearDown network for sandbox \"511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460\" successfully" Dec 13 02:04:10.891278 env[1212]: time="2024-12-13T02:04:10.890797561Z" level=info msg="StopPodSandbox for \"511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460\" returns successfully" Dec 13 02:04:10.892750 systemd[1]: run-netns-cni\x2ddb4d03f7\x2d9709\x2d1fb3\x2d50dc\x2da12e363db916.mount: Deactivated successfully. Dec 13 02:04:10.894033 env[1212]: time="2024-12-13T02:04:10.893996796Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7bffbb6c48-lhwh7,Uid:d9b9f041-0447-4f1c-aa10-5116ff6c6616,Namespace:calico-apiserver,Attempt:1,}" Dec 13 02:04:10.904278 systemd-networkd[1031]: calia9ec47c4d0c: Gained IPv6LL Dec 13 02:04:11.054278 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:04:11.054392 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali13af5236812: link becomes ready Dec 13 02:04:11.054460 systemd-networkd[1031]: cali13af5236812: Link UP Dec 13 02:04:11.054640 systemd-networkd[1031]: cali13af5236812: Gained carrier Dec 13 02:04:11.071815 env[1212]: 2024-12-13 02:04:10.950 [INFO][3944] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--wlj2f-eth0 csi-node-driver- calico-system 6caefe76-fe04-44c0-b43e-81fd39cda0c9 929 0 2024-12-13 02:03:35 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:65bf684474 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-wlj2f eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali13af5236812 [] []}} ContainerID="547b7c9366996a02007b48ae49dc14308f500976faa42822dec13fdeac9fd925" Namespace="calico-system" Pod="csi-node-driver-wlj2f" WorkloadEndpoint="localhost-k8s-csi--node--driver--wlj2f-" Dec 13 02:04:11.071815 env[1212]: 2024-12-13 02:04:10.950 [INFO][3944] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="547b7c9366996a02007b48ae49dc14308f500976faa42822dec13fdeac9fd925" Namespace="calico-system" Pod="csi-node-driver-wlj2f" WorkloadEndpoint="localhost-k8s-csi--node--driver--wlj2f-eth0" Dec 13 02:04:11.071815 env[1212]: 2024-12-13 02:04:10.989 [INFO][3972] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="547b7c9366996a02007b48ae49dc14308f500976faa42822dec13fdeac9fd925" HandleID="k8s-pod-network.547b7c9366996a02007b48ae49dc14308f500976faa42822dec13fdeac9fd925" Workload="localhost-k8s-csi--node--driver--wlj2f-eth0" Dec 13 02:04:11.071815 env[1212]: 2024-12-13 02:04:10.999 [INFO][3972] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="547b7c9366996a02007b48ae49dc14308f500976faa42822dec13fdeac9fd925" HandleID="k8s-pod-network.547b7c9366996a02007b48ae49dc14308f500976faa42822dec13fdeac9fd925" Workload="localhost-k8s-csi--node--driver--wlj2f-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00012ad20), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-wlj2f", "timestamp":"2024-12-13 02:04:10.989536057 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:04:11.071815 env[1212]: 2024-12-13 02:04:10.999 [INFO][3972] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:04:11.071815 env[1212]: 2024-12-13 02:04:11.000 [INFO][3972] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:04:11.071815 env[1212]: 2024-12-13 02:04:11.000 [INFO][3972] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 02:04:11.071815 env[1212]: 2024-12-13 02:04:11.001 [INFO][3972] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.547b7c9366996a02007b48ae49dc14308f500976faa42822dec13fdeac9fd925" host="localhost" Dec 13 02:04:11.071815 env[1212]: 2024-12-13 02:04:11.004 [INFO][3972] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 02:04:11.071815 env[1212]: 2024-12-13 02:04:11.014 [INFO][3972] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 02:04:11.071815 env[1212]: 2024-12-13 02:04:11.016 [INFO][3972] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 02:04:11.071815 env[1212]: 2024-12-13 02:04:11.018 [INFO][3972] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 02:04:11.071815 env[1212]: 2024-12-13 02:04:11.018 [INFO][3972] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.547b7c9366996a02007b48ae49dc14308f500976faa42822dec13fdeac9fd925" host="localhost" Dec 13 02:04:11.071815 env[1212]: 2024-12-13 02:04:11.019 [INFO][3972] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.547b7c9366996a02007b48ae49dc14308f500976faa42822dec13fdeac9fd925 Dec 13 02:04:11.071815 env[1212]: 2024-12-13 02:04:11.025 [INFO][3972] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.547b7c9366996a02007b48ae49dc14308f500976faa42822dec13fdeac9fd925" host="localhost" Dec 13 02:04:11.071815 env[1212]: 2024-12-13 02:04:11.036 [INFO][3972] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.547b7c9366996a02007b48ae49dc14308f500976faa42822dec13fdeac9fd925" host="localhost" Dec 13 02:04:11.071815 env[1212]: 2024-12-13 02:04:11.037 [INFO][3972] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.547b7c9366996a02007b48ae49dc14308f500976faa42822dec13fdeac9fd925" host="localhost" Dec 13 02:04:11.071815 env[1212]: 2024-12-13 02:04:11.037 [INFO][3972] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:04:11.071815 env[1212]: 2024-12-13 02:04:11.037 [INFO][3972] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="547b7c9366996a02007b48ae49dc14308f500976faa42822dec13fdeac9fd925" HandleID="k8s-pod-network.547b7c9366996a02007b48ae49dc14308f500976faa42822dec13fdeac9fd925" Workload="localhost-k8s-csi--node--driver--wlj2f-eth0" Dec 13 02:04:11.072563 env[1212]: 2024-12-13 02:04:11.039 [INFO][3944] cni-plugin/k8s.go 386: Populated endpoint ContainerID="547b7c9366996a02007b48ae49dc14308f500976faa42822dec13fdeac9fd925" Namespace="calico-system" Pod="csi-node-driver-wlj2f" WorkloadEndpoint="localhost-k8s-csi--node--driver--wlj2f-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--wlj2f-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"6caefe76-fe04-44c0-b43e-81fd39cda0c9", ResourceVersion:"929", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 3, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-wlj2f", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali13af5236812", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:04:11.072563 env[1212]: 2024-12-13 02:04:11.039 [INFO][3944] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="547b7c9366996a02007b48ae49dc14308f500976faa42822dec13fdeac9fd925" Namespace="calico-system" Pod="csi-node-driver-wlj2f" WorkloadEndpoint="localhost-k8s-csi--node--driver--wlj2f-eth0" Dec 13 02:04:11.072563 env[1212]: 2024-12-13 02:04:11.039 [INFO][3944] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali13af5236812 ContainerID="547b7c9366996a02007b48ae49dc14308f500976faa42822dec13fdeac9fd925" Namespace="calico-system" Pod="csi-node-driver-wlj2f" WorkloadEndpoint="localhost-k8s-csi--node--driver--wlj2f-eth0" Dec 13 02:04:11.072563 env[1212]: 2024-12-13 02:04:11.054 [INFO][3944] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="547b7c9366996a02007b48ae49dc14308f500976faa42822dec13fdeac9fd925" Namespace="calico-system" Pod="csi-node-driver-wlj2f" WorkloadEndpoint="localhost-k8s-csi--node--driver--wlj2f-eth0" Dec 13 02:04:11.072563 env[1212]: 2024-12-13 02:04:11.055 [INFO][3944] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="547b7c9366996a02007b48ae49dc14308f500976faa42822dec13fdeac9fd925" Namespace="calico-system" Pod="csi-node-driver-wlj2f" WorkloadEndpoint="localhost-k8s-csi--node--driver--wlj2f-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--wlj2f-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"6caefe76-fe04-44c0-b43e-81fd39cda0c9", ResourceVersion:"929", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 3, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"547b7c9366996a02007b48ae49dc14308f500976faa42822dec13fdeac9fd925", Pod:"csi-node-driver-wlj2f", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali13af5236812", MAC:"72:19:0f:d9:5c:b4", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:04:11.072563 env[1212]: 2024-12-13 02:04:11.069 [INFO][3944] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="547b7c9366996a02007b48ae49dc14308f500976faa42822dec13fdeac9fd925" Namespace="calico-system" Pod="csi-node-driver-wlj2f" WorkloadEndpoint="localhost-k8s-csi--node--driver--wlj2f-eth0" Dec 13 02:04:11.080077 systemd-networkd[1031]: cali8b1683020dd: Link UP Dec 13 02:04:11.080229 systemd-networkd[1031]: cali8b1683020dd: Gained carrier Dec 13 02:04:11.081954 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8b1683020dd: link becomes ready Dec 13 02:04:11.083000 audit[4002]: NETFILTER_CFG table=filter:101 family=2 entries=38 op=nft_register_chain pid=4002 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:04:11.083000 audit[4002]: SYSCALL arch=c000003e syscall=46 success=yes exit=19828 a0=3 a1=7ffd490c7ab0 a2=0 a3=7ffd490c7a9c items=0 ppid=3679 pid=4002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:11.083000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:04:11.092131 env[1212]: 2024-12-13 02:04:10.961 [INFO][3958] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--7bffbb6c48--lhwh7-eth0 calico-apiserver-7bffbb6c48- calico-apiserver d9b9f041-0447-4f1c-aa10-5116ff6c6616 930 0 2024-12-13 02:03:35 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7bffbb6c48 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-7bffbb6c48-lhwh7 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali8b1683020dd [] []}} ContainerID="c873e8014e9c4fcdbcc834eeb54c5eed0803756b529fcb4770afe8fedc0e3dca" Namespace="calico-apiserver" Pod="calico-apiserver-7bffbb6c48-lhwh7" WorkloadEndpoint="localhost-k8s-calico--apiserver--7bffbb6c48--lhwh7-" Dec 13 02:04:11.092131 env[1212]: 2024-12-13 02:04:10.961 [INFO][3958] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="c873e8014e9c4fcdbcc834eeb54c5eed0803756b529fcb4770afe8fedc0e3dca" Namespace="calico-apiserver" Pod="calico-apiserver-7bffbb6c48-lhwh7" WorkloadEndpoint="localhost-k8s-calico--apiserver--7bffbb6c48--lhwh7-eth0" Dec 13 02:04:11.092131 env[1212]: 2024-12-13 02:04:11.018 [INFO][3977] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c873e8014e9c4fcdbcc834eeb54c5eed0803756b529fcb4770afe8fedc0e3dca" HandleID="k8s-pod-network.c873e8014e9c4fcdbcc834eeb54c5eed0803756b529fcb4770afe8fedc0e3dca" Workload="localhost-k8s-calico--apiserver--7bffbb6c48--lhwh7-eth0" Dec 13 02:04:11.092131 env[1212]: 2024-12-13 02:04:11.036 [INFO][3977] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c873e8014e9c4fcdbcc834eeb54c5eed0803756b529fcb4770afe8fedc0e3dca" HandleID="k8s-pod-network.c873e8014e9c4fcdbcc834eeb54c5eed0803756b529fcb4770afe8fedc0e3dca" Workload="localhost-k8s-calico--apiserver--7bffbb6c48--lhwh7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000212a70), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-7bffbb6c48-lhwh7", "timestamp":"2024-12-13 02:04:11.018955069 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:04:11.092131 env[1212]: 2024-12-13 02:04:11.036 [INFO][3977] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:04:11.092131 env[1212]: 2024-12-13 02:04:11.037 [INFO][3977] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:04:11.092131 env[1212]: 2024-12-13 02:04:11.037 [INFO][3977] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 02:04:11.092131 env[1212]: 2024-12-13 02:04:11.039 [INFO][3977] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c873e8014e9c4fcdbcc834eeb54c5eed0803756b529fcb4770afe8fedc0e3dca" host="localhost" Dec 13 02:04:11.092131 env[1212]: 2024-12-13 02:04:11.044 [INFO][3977] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 02:04:11.092131 env[1212]: 2024-12-13 02:04:11.050 [INFO][3977] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 02:04:11.092131 env[1212]: 2024-12-13 02:04:11.052 [INFO][3977] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 02:04:11.092131 env[1212]: 2024-12-13 02:04:11.054 [INFO][3977] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 02:04:11.092131 env[1212]: 2024-12-13 02:04:11.054 [INFO][3977] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.c873e8014e9c4fcdbcc834eeb54c5eed0803756b529fcb4770afe8fedc0e3dca" host="localhost" Dec 13 02:04:11.092131 env[1212]: 2024-12-13 02:04:11.060 [INFO][3977] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.c873e8014e9c4fcdbcc834eeb54c5eed0803756b529fcb4770afe8fedc0e3dca Dec 13 02:04:11.092131 env[1212]: 2024-12-13 02:04:11.066 [INFO][3977] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.c873e8014e9c4fcdbcc834eeb54c5eed0803756b529fcb4770afe8fedc0e3dca" host="localhost" Dec 13 02:04:11.092131 env[1212]: 2024-12-13 02:04:11.074 [INFO][3977] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.c873e8014e9c4fcdbcc834eeb54c5eed0803756b529fcb4770afe8fedc0e3dca" host="localhost" Dec 13 02:04:11.092131 env[1212]: 2024-12-13 02:04:11.074 [INFO][3977] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.c873e8014e9c4fcdbcc834eeb54c5eed0803756b529fcb4770afe8fedc0e3dca" host="localhost" Dec 13 02:04:11.092131 env[1212]: 2024-12-13 02:04:11.074 [INFO][3977] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:04:11.092131 env[1212]: 2024-12-13 02:04:11.074 [INFO][3977] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="c873e8014e9c4fcdbcc834eeb54c5eed0803756b529fcb4770afe8fedc0e3dca" HandleID="k8s-pod-network.c873e8014e9c4fcdbcc834eeb54c5eed0803756b529fcb4770afe8fedc0e3dca" Workload="localhost-k8s-calico--apiserver--7bffbb6c48--lhwh7-eth0" Dec 13 02:04:11.092730 env[1212]: 2024-12-13 02:04:11.077 [INFO][3958] cni-plugin/k8s.go 386: Populated endpoint ContainerID="c873e8014e9c4fcdbcc834eeb54c5eed0803756b529fcb4770afe8fedc0e3dca" Namespace="calico-apiserver" Pod="calico-apiserver-7bffbb6c48-lhwh7" WorkloadEndpoint="localhost-k8s-calico--apiserver--7bffbb6c48--lhwh7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7bffbb6c48--lhwh7-eth0", GenerateName:"calico-apiserver-7bffbb6c48-", Namespace:"calico-apiserver", SelfLink:"", UID:"d9b9f041-0447-4f1c-aa10-5116ff6c6616", ResourceVersion:"930", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 3, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7bffbb6c48", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-7bffbb6c48-lhwh7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8b1683020dd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:04:11.092730 env[1212]: 2024-12-13 02:04:11.077 [INFO][3958] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="c873e8014e9c4fcdbcc834eeb54c5eed0803756b529fcb4770afe8fedc0e3dca" Namespace="calico-apiserver" Pod="calico-apiserver-7bffbb6c48-lhwh7" WorkloadEndpoint="localhost-k8s-calico--apiserver--7bffbb6c48--lhwh7-eth0" Dec 13 02:04:11.092730 env[1212]: 2024-12-13 02:04:11.077 [INFO][3958] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali8b1683020dd ContainerID="c873e8014e9c4fcdbcc834eeb54c5eed0803756b529fcb4770afe8fedc0e3dca" Namespace="calico-apiserver" Pod="calico-apiserver-7bffbb6c48-lhwh7" WorkloadEndpoint="localhost-k8s-calico--apiserver--7bffbb6c48--lhwh7-eth0" Dec 13 02:04:11.092730 env[1212]: 2024-12-13 02:04:11.079 [INFO][3958] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c873e8014e9c4fcdbcc834eeb54c5eed0803756b529fcb4770afe8fedc0e3dca" Namespace="calico-apiserver" Pod="calico-apiserver-7bffbb6c48-lhwh7" WorkloadEndpoint="localhost-k8s-calico--apiserver--7bffbb6c48--lhwh7-eth0" Dec 13 02:04:11.092730 env[1212]: 2024-12-13 02:04:11.079 [INFO][3958] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="c873e8014e9c4fcdbcc834eeb54c5eed0803756b529fcb4770afe8fedc0e3dca" Namespace="calico-apiserver" Pod="calico-apiserver-7bffbb6c48-lhwh7" WorkloadEndpoint="localhost-k8s-calico--apiserver--7bffbb6c48--lhwh7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7bffbb6c48--lhwh7-eth0", GenerateName:"calico-apiserver-7bffbb6c48-", Namespace:"calico-apiserver", SelfLink:"", UID:"d9b9f041-0447-4f1c-aa10-5116ff6c6616", ResourceVersion:"930", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 3, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7bffbb6c48", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c873e8014e9c4fcdbcc834eeb54c5eed0803756b529fcb4770afe8fedc0e3dca", Pod:"calico-apiserver-7bffbb6c48-lhwh7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8b1683020dd", MAC:"72:ae:07:b8:34:48", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:04:11.092730 env[1212]: 2024-12-13 02:04:11.088 [INFO][3958] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="c873e8014e9c4fcdbcc834eeb54c5eed0803756b529fcb4770afe8fedc0e3dca" Namespace="calico-apiserver" Pod="calico-apiserver-7bffbb6c48-lhwh7" WorkloadEndpoint="localhost-k8s-calico--apiserver--7bffbb6c48--lhwh7-eth0" Dec 13 02:04:11.095050 env[1212]: time="2024-12-13T02:04:11.095000303Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:04:11.095121 env[1212]: time="2024-12-13T02:04:11.095047154Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:04:11.095121 env[1212]: time="2024-12-13T02:04:11.095066922Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:04:11.095221 env[1212]: time="2024-12-13T02:04:11.095184910Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/547b7c9366996a02007b48ae49dc14308f500976faa42822dec13fdeac9fd925 pid=4011 runtime=io.containerd.runc.v2 Dec 13 02:04:11.103000 audit[4032]: NETFILTER_CFG table=filter:102 family=2 entries=42 op=nft_register_chain pid=4032 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:04:11.103000 audit[4032]: SYSCALL arch=c000003e syscall=46 success=yes exit=22704 a0=3 a1=7ffee13b1a10 a2=0 a3=7ffee13b19fc items=0 ppid=3679 pid=4032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:11.103000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:04:11.111440 systemd[1]: Started cri-containerd-547b7c9366996a02007b48ae49dc14308f500976faa42822dec13fdeac9fd925.scope. Dec 13 02:04:11.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.123000 audit: BPF prog-id=166 op=LOAD Dec 13 02:04:11.123000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.123000 audit[4025]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4011 pid=4025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:11.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534376237633933363639393661303230303762343861653439646331 Dec 13 02:04:11.123000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.123000 audit[4025]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=4011 pid=4025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:11.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534376237633933363639393661303230303762343861653439646331 Dec 13 02:04:11.123000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.123000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.123000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.123000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.123000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.123000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.123000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.123000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.123000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.123000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.123000 audit: BPF prog-id=167 op=LOAD Dec 13 02:04:11.123000 audit[4025]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000185a20 items=0 ppid=4011 pid=4025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:11.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534376237633933363639393661303230303762343861653439646331 Dec 13 02:04:11.123000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.123000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.123000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.123000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.123000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.123000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.123000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.123000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.123000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.123000 audit: BPF prog-id=168 op=LOAD Dec 13 02:04:11.123000 audit[4025]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000185a68 items=0 ppid=4011 pid=4025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:11.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534376237633933363639393661303230303762343861653439646331 Dec 13 02:04:11.123000 audit: BPF prog-id=168 op=UNLOAD Dec 13 02:04:11.123000 audit: BPF prog-id=167 op=UNLOAD Dec 13 02:04:11.123000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.123000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.123000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.123000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.123000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.123000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.123000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.123000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.123000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.123000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.123000 audit: BPF prog-id=169 op=LOAD Dec 13 02:04:11.123000 audit[4025]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000185e78 items=0 ppid=4011 pid=4025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:11.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534376237633933363639393661303230303762343861653439646331 Dec 13 02:04:11.125364 systemd-resolved[1144]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 02:04:11.129532 env[1212]: time="2024-12-13T02:04:11.129385826Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:04:11.129532 env[1212]: time="2024-12-13T02:04:11.129432526Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:04:11.129532 env[1212]: time="2024-12-13T02:04:11.129443809Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:04:11.135736 env[1212]: time="2024-12-13T02:04:11.135676496Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c873e8014e9c4fcdbcc834eeb54c5eed0803756b529fcb4770afe8fedc0e3dca pid=4054 runtime=io.containerd.runc.v2 Dec 13 02:04:11.147774 env[1212]: time="2024-12-13T02:04:11.147742158Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wlj2f,Uid:6caefe76-fe04-44c0-b43e-81fd39cda0c9,Namespace:calico-system,Attempt:1,} returns sandbox id \"547b7c9366996a02007b48ae49dc14308f500976faa42822dec13fdeac9fd925\"" Dec 13 02:04:11.151332 systemd[1]: Started cri-containerd-c873e8014e9c4fcdbcc834eeb54c5eed0803756b529fcb4770afe8fedc0e3dca.scope. Dec 13 02:04:11.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.164000 audit: BPF prog-id=170 op=LOAD Dec 13 02:04:11.164000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.164000 audit[4072]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4054 pid=4072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:11.164000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338373365383031346539633466636462636338333465656235346335 Dec 13 02:04:11.164000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.164000 audit[4072]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4054 pid=4072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:11.164000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338373365383031346539633466636462636338333465656235346335 Dec 13 02:04:11.164000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.164000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.164000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.164000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.164000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.164000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.164000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.164000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.164000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.164000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.164000 audit: BPF prog-id=171 op=LOAD Dec 13 02:04:11.164000 audit[4072]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003892a0 items=0 ppid=4054 pid=4072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:11.164000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338373365383031346539633466636462636338333465656235346335 Dec 13 02:04:11.164000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.164000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.164000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.164000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.164000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.164000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.164000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.164000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.164000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.164000 audit: BPF prog-id=172 op=LOAD Dec 13 02:04:11.164000 audit[4072]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003892e8 items=0 ppid=4054 pid=4072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:11.164000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338373365383031346539633466636462636338333465656235346335 Dec 13 02:04:11.164000 audit: BPF prog-id=172 op=UNLOAD Dec 13 02:04:11.164000 audit: BPF prog-id=171 op=UNLOAD Dec 13 02:04:11.164000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.164000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.164000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.164000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.164000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.164000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.164000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.164000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.164000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.164000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.164000 audit: BPF prog-id=173 op=LOAD Dec 13 02:04:11.164000 audit[4072]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003896f8 items=0 ppid=4054 pid=4072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:11.164000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338373365383031346539633466636462636338333465656235346335 Dec 13 02:04:11.166286 systemd-resolved[1144]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 02:04:11.190330 env[1212]: time="2024-12-13T02:04:11.190290339Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7bffbb6c48-lhwh7,Uid:d9b9f041-0447-4f1c-aa10-5116ff6c6616,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"c873e8014e9c4fcdbcc834eeb54c5eed0803756b529fcb4770afe8fedc0e3dca\"" Dec 13 02:04:11.479021 systemd-networkd[1031]: vxlan.calico: Gained IPv6LL Dec 13 02:04:11.724860 env[1212]: time="2024-12-13T02:04:11.724763365Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:11.728462 env[1212]: time="2024-12-13T02:04:11.728423749Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:11.730360 env[1212]: time="2024-12-13T02:04:11.730220611Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:11.731826 env[1212]: time="2024-12-13T02:04:11.731793480Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:11.732278 env[1212]: time="2024-12-13T02:04:11.732224855Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da\"" Dec 13 02:04:11.733226 env[1212]: time="2024-12-13T02:04:11.733175848Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 02:04:11.738957 env[1212]: time="2024-12-13T02:04:11.738925790Z" level=info msg="CreateContainer within sandbox \"c70d8344fffe18c2d61329f7869fccae592a7b4d0af31aee093e6953569b165f\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 02:04:11.754143 env[1212]: time="2024-12-13T02:04:11.754072843Z" level=info msg="CreateContainer within sandbox \"c70d8344fffe18c2d61329f7869fccae592a7b4d0af31aee093e6953569b165f\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"ee6b158ace42dfb3135b099fa33205011df64e6541138e152d52849f20b7b0d2\"" Dec 13 02:04:11.754740 env[1212]: time="2024-12-13T02:04:11.754678416Z" level=info msg="StartContainer for \"ee6b158ace42dfb3135b099fa33205011df64e6541138e152d52849f20b7b0d2\"" Dec 13 02:04:11.772056 systemd[1]: Started cri-containerd-ee6b158ace42dfb3135b099fa33205011df64e6541138e152d52849f20b7b0d2.scope. Dec 13 02:04:11.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.783000 audit: BPF prog-id=174 op=LOAD Dec 13 02:04:11.784000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.784000 audit[4106]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3554 pid=4106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:11.784000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565366231353861636534326466623331333562303939666133333230 Dec 13 02:04:11.784000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.784000 audit[4106]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3554 pid=4106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:11.784000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565366231353861636534326466623331333562303939666133333230 Dec 13 02:04:11.784000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.784000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.784000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.784000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.784000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.784000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.784000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.784000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.784000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.784000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.784000 audit: BPF prog-id=175 op=LOAD Dec 13 02:04:11.784000 audit[4106]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000233d00 items=0 ppid=3554 pid=4106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:11.784000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565366231353861636534326466623331333562303939666133333230 Dec 13 02:04:11.784000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.784000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.784000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.784000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.784000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.784000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.784000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.784000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.784000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.784000 audit: BPF prog-id=176 op=LOAD Dec 13 02:04:11.784000 audit[4106]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000233d48 items=0 ppid=3554 pid=4106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:11.784000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565366231353861636534326466623331333562303939666133333230 Dec 13 02:04:11.784000 audit: BPF prog-id=176 op=UNLOAD Dec 13 02:04:11.784000 audit: BPF prog-id=175 op=UNLOAD Dec 13 02:04:11.784000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.784000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.784000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.784000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.784000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.784000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.784000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.784000 audit[4106]: AVC avc: denied { perfmon } for pid=4106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.784000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.784000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:11.784000 audit: BPF prog-id=177 op=LOAD Dec 13 02:04:11.784000 audit[4106]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003b6158 items=0 ppid=3554 pid=4106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:11.784000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565366231353861636534326466623331333562303939666133333230 Dec 13 02:04:11.939778 env[1212]: time="2024-12-13T02:04:11.939713415Z" level=info msg="StartContainer for \"ee6b158ace42dfb3135b099fa33205011df64e6541138e152d52849f20b7b0d2\" returns successfully" Dec 13 02:04:12.052215 kubelet[2056]: I1213 02:04:12.051691 2056 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-784649585b-dmq4n" podStartSLOduration=34.399144073 podStartE2EDuration="37.051671025s" podCreationTimestamp="2024-12-13 02:03:35 +0000 UTC" firstStartedPulling="2024-12-13 02:04:09.080411786 +0000 UTC m=+56.659096790" lastFinishedPulling="2024-12-13 02:04:11.732938738 +0000 UTC m=+59.311623742" observedRunningTime="2024-12-13 02:04:12.018123924 +0000 UTC m=+59.596808928" watchObservedRunningTime="2024-12-13 02:04:12.051671025 +0000 UTC m=+59.630356029" Dec 13 02:04:12.436000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8228 scontext=system_u:system_r:svirt_lxc_net_t:s0:c279,c502 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:04:12.436000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8228 scontext=system_u:system_r:svirt_lxc_net_t:s0:c279,c502 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:04:12.436000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8228 scontext=system_u:system_r:svirt_lxc_net_t:s0:c279,c502 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:04:12.436000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0006d62c0 a2=fc6 a3=0 items=0 ppid=1800 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c279,c502 key=(null) Dec 13 02:04:12.436000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001c1c220 a2=fc6 a3=0 items=0 ppid=1800 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c279,c502 key=(null) Dec 13 02:04:12.436000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000dfc760 a2=fc6 a3=0 items=0 ppid=1800 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c279,c502 key=(null) Dec 13 02:04:12.436000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:04:12.436000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:04:12.436000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8228 scontext=system_u:system_r:svirt_lxc_net_t:s0:c279,c502 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:04:12.436000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=c000f03fa0 a2=fc6 a3=0 items=0 ppid=1800 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c279,c502 key=(null) Dec 13 02:04:12.436000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:04:12.436000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:04:12.497319 env[1212]: time="2024-12-13T02:04:12.497277509Z" level=info msg="StopPodSandbox for \"2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6\"" Dec 13 02:04:12.514742 systemd-networkd[1031]: cali13af5236812: Gained IPv6LL Dec 13 02:04:12.562756 env[1212]: 2024-12-13 02:04:12.532 [WARNING][4172] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7bffbb6c48--67kk2-eth0", GenerateName:"calico-apiserver-7bffbb6c48-", Namespace:"calico-apiserver", SelfLink:"", UID:"591490e8-6d9f-4a88-89f8-2785413ddcdc", ResourceVersion:"914", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 3, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7bffbb6c48", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c5425d877dba5a3f3b8f737e22398717e30351069855f064bfc0f1dae090393a", Pod:"calico-apiserver-7bffbb6c48-67kk2", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calib6999c1257d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:04:12.562756 env[1212]: 2024-12-13 02:04:12.532 [INFO][4172] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6" Dec 13 02:04:12.562756 env[1212]: 2024-12-13 02:04:12.532 [INFO][4172] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6" iface="eth0" netns="" Dec 13 02:04:12.562756 env[1212]: 2024-12-13 02:04:12.532 [INFO][4172] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6" Dec 13 02:04:12.562756 env[1212]: 2024-12-13 02:04:12.532 [INFO][4172] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6" Dec 13 02:04:12.562756 env[1212]: 2024-12-13 02:04:12.552 [INFO][4182] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6" HandleID="k8s-pod-network.2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6" Workload="localhost-k8s-calico--apiserver--7bffbb6c48--67kk2-eth0" Dec 13 02:04:12.562756 env[1212]: 2024-12-13 02:04:12.552 [INFO][4182] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:04:12.562756 env[1212]: 2024-12-13 02:04:12.552 [INFO][4182] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:04:12.562756 env[1212]: 2024-12-13 02:04:12.557 [WARNING][4182] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6" HandleID="k8s-pod-network.2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6" Workload="localhost-k8s-calico--apiserver--7bffbb6c48--67kk2-eth0" Dec 13 02:04:12.562756 env[1212]: 2024-12-13 02:04:12.557 [INFO][4182] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6" HandleID="k8s-pod-network.2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6" Workload="localhost-k8s-calico--apiserver--7bffbb6c48--67kk2-eth0" Dec 13 02:04:12.562756 env[1212]: 2024-12-13 02:04:12.559 [INFO][4182] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:04:12.562756 env[1212]: 2024-12-13 02:04:12.561 [INFO][4172] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6" Dec 13 02:04:12.563254 env[1212]: time="2024-12-13T02:04:12.562783887Z" level=info msg="TearDown network for sandbox \"2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6\" successfully" Dec 13 02:04:12.563254 env[1212]: time="2024-12-13T02:04:12.562816711Z" level=info msg="StopPodSandbox for \"2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6\" returns successfully" Dec 13 02:04:12.563762 env[1212]: time="2024-12-13T02:04:12.563728727Z" level=info msg="RemovePodSandbox for \"2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6\"" Dec 13 02:04:12.563859 env[1212]: time="2024-12-13T02:04:12.563814573Z" level=info msg="Forcibly stopping sandbox \"2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6\"" Dec 13 02:04:12.625134 env[1212]: 2024-12-13 02:04:12.598 [WARNING][4206] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7bffbb6c48--67kk2-eth0", GenerateName:"calico-apiserver-7bffbb6c48-", Namespace:"calico-apiserver", SelfLink:"", UID:"591490e8-6d9f-4a88-89f8-2785413ddcdc", ResourceVersion:"914", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 3, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7bffbb6c48", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c5425d877dba5a3f3b8f737e22398717e30351069855f064bfc0f1dae090393a", Pod:"calico-apiserver-7bffbb6c48-67kk2", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calib6999c1257d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:04:12.625134 env[1212]: 2024-12-13 02:04:12.598 [INFO][4206] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6" Dec 13 02:04:12.625134 env[1212]: 2024-12-13 02:04:12.598 [INFO][4206] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6" iface="eth0" netns="" Dec 13 02:04:12.625134 env[1212]: 2024-12-13 02:04:12.598 [INFO][4206] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6" Dec 13 02:04:12.625134 env[1212]: 2024-12-13 02:04:12.598 [INFO][4206] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6" Dec 13 02:04:12.625134 env[1212]: 2024-12-13 02:04:12.616 [INFO][4213] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6" HandleID="k8s-pod-network.2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6" Workload="localhost-k8s-calico--apiserver--7bffbb6c48--67kk2-eth0" Dec 13 02:04:12.625134 env[1212]: 2024-12-13 02:04:12.616 [INFO][4213] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:04:12.625134 env[1212]: 2024-12-13 02:04:12.616 [INFO][4213] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:04:12.625134 env[1212]: 2024-12-13 02:04:12.621 [WARNING][4213] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6" HandleID="k8s-pod-network.2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6" Workload="localhost-k8s-calico--apiserver--7bffbb6c48--67kk2-eth0" Dec 13 02:04:12.625134 env[1212]: 2024-12-13 02:04:12.621 [INFO][4213] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6" HandleID="k8s-pod-network.2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6" Workload="localhost-k8s-calico--apiserver--7bffbb6c48--67kk2-eth0" Dec 13 02:04:12.625134 env[1212]: 2024-12-13 02:04:12.622 [INFO][4213] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:04:12.625134 env[1212]: 2024-12-13 02:04:12.623 [INFO][4206] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6" Dec 13 02:04:12.625633 env[1212]: time="2024-12-13T02:04:12.625137622Z" level=info msg="TearDown network for sandbox \"2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6\" successfully" Dec 13 02:04:12.678971 env[1212]: time="2024-12-13T02:04:12.678907887Z" level=info msg="RemovePodSandbox \"2063eea73a428480d6745b8ace792f4d3397ff0c8f1941a5b7b608e9413202c6\" returns successfully" Dec 13 02:04:12.679587 env[1212]: time="2024-12-13T02:04:12.679540071Z" level=info msg="StopPodSandbox for \"b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e\"" Dec 13 02:04:12.695629 systemd-networkd[1031]: cali8b1683020dd: Gained IPv6LL Dec 13 02:04:12.742292 env[1212]: 2024-12-13 02:04:12.713 [WARNING][4235] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--wlj2f-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"6caefe76-fe04-44c0-b43e-81fd39cda0c9", ResourceVersion:"935", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 3, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"547b7c9366996a02007b48ae49dc14308f500976faa42822dec13fdeac9fd925", Pod:"csi-node-driver-wlj2f", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali13af5236812", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:04:12.742292 env[1212]: 2024-12-13 02:04:12.713 [INFO][4235] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e" Dec 13 02:04:12.742292 env[1212]: 2024-12-13 02:04:12.713 [INFO][4235] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e" iface="eth0" netns="" Dec 13 02:04:12.742292 env[1212]: 2024-12-13 02:04:12.713 [INFO][4235] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e" Dec 13 02:04:12.742292 env[1212]: 2024-12-13 02:04:12.714 [INFO][4235] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e" Dec 13 02:04:12.742292 env[1212]: 2024-12-13 02:04:12.733 [INFO][4243] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e" HandleID="k8s-pod-network.b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e" Workload="localhost-k8s-csi--node--driver--wlj2f-eth0" Dec 13 02:04:12.742292 env[1212]: 2024-12-13 02:04:12.733 [INFO][4243] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:04:12.742292 env[1212]: 2024-12-13 02:04:12.733 [INFO][4243] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:04:12.742292 env[1212]: 2024-12-13 02:04:12.738 [WARNING][4243] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e" HandleID="k8s-pod-network.b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e" Workload="localhost-k8s-csi--node--driver--wlj2f-eth0" Dec 13 02:04:12.742292 env[1212]: 2024-12-13 02:04:12.738 [INFO][4243] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e" HandleID="k8s-pod-network.b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e" Workload="localhost-k8s-csi--node--driver--wlj2f-eth0" Dec 13 02:04:12.742292 env[1212]: 2024-12-13 02:04:12.739 [INFO][4243] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:04:12.742292 env[1212]: 2024-12-13 02:04:12.741 [INFO][4235] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e" Dec 13 02:04:12.743112 env[1212]: time="2024-12-13T02:04:12.742324519Z" level=info msg="TearDown network for sandbox \"b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e\" successfully" Dec 13 02:04:12.743112 env[1212]: time="2024-12-13T02:04:12.742362251Z" level=info msg="StopPodSandbox for \"b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e\" returns successfully" Dec 13 02:04:12.743112 env[1212]: time="2024-12-13T02:04:12.742801903Z" level=info msg="RemovePodSandbox for \"b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e\"" Dec 13 02:04:12.743112 env[1212]: time="2024-12-13T02:04:12.742828625Z" level=info msg="Forcibly stopping sandbox \"b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e\"" Dec 13 02:04:12.815970 env[1212]: 2024-12-13 02:04:12.773 [WARNING][4266] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--wlj2f-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"6caefe76-fe04-44c0-b43e-81fd39cda0c9", ResourceVersion:"935", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 3, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"547b7c9366996a02007b48ae49dc14308f500976faa42822dec13fdeac9fd925", Pod:"csi-node-driver-wlj2f", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali13af5236812", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:04:12.815970 env[1212]: 2024-12-13 02:04:12.774 [INFO][4266] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e" Dec 13 02:04:12.815970 env[1212]: 2024-12-13 02:04:12.774 [INFO][4266] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e" iface="eth0" netns="" Dec 13 02:04:12.815970 env[1212]: 2024-12-13 02:04:12.774 [INFO][4266] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e" Dec 13 02:04:12.815970 env[1212]: 2024-12-13 02:04:12.774 [INFO][4266] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e" Dec 13 02:04:12.815970 env[1212]: 2024-12-13 02:04:12.797 [INFO][4275] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e" HandleID="k8s-pod-network.b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e" Workload="localhost-k8s-csi--node--driver--wlj2f-eth0" Dec 13 02:04:12.815970 env[1212]: 2024-12-13 02:04:12.797 [INFO][4275] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:04:12.815970 env[1212]: 2024-12-13 02:04:12.797 [INFO][4275] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:04:12.815970 env[1212]: 2024-12-13 02:04:12.811 [WARNING][4275] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e" HandleID="k8s-pod-network.b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e" Workload="localhost-k8s-csi--node--driver--wlj2f-eth0" Dec 13 02:04:12.815970 env[1212]: 2024-12-13 02:04:12.811 [INFO][4275] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e" HandleID="k8s-pod-network.b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e" Workload="localhost-k8s-csi--node--driver--wlj2f-eth0" Dec 13 02:04:12.815970 env[1212]: 2024-12-13 02:04:12.813 [INFO][4275] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:04:12.815970 env[1212]: 2024-12-13 02:04:12.814 [INFO][4266] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e" Dec 13 02:04:12.816527 env[1212]: time="2024-12-13T02:04:12.815984754Z" level=info msg="TearDown network for sandbox \"b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e\" successfully" Dec 13 02:04:12.819505 env[1212]: time="2024-12-13T02:04:12.819441706Z" level=info msg="RemovePodSandbox \"b4b0624d634ceef3a53aac571b067bd7b53b9a56cd65feed079e9539199d055e\" returns successfully" Dec 13 02:04:12.820065 env[1212]: time="2024-12-13T02:04:12.820036839Z" level=info msg="StopPodSandbox for \"c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af\"" Dec 13 02:04:12.886763 env[1212]: 2024-12-13 02:04:12.858 [WARNING][4297] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--784649585b--dmq4n-eth0", GenerateName:"calico-kube-controllers-784649585b-", Namespace:"calico-system", SelfLink:"", UID:"ba1c6a87-03d0-4fc7-8058-05b0fe24f8ff", ResourceVersion:"951", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 3, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"784649585b", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c70d8344fffe18c2d61329f7869fccae592a7b4d0af31aee093e6953569b165f", Pod:"calico-kube-controllers-784649585b-dmq4n", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calia9ec47c4d0c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:04:12.886763 env[1212]: 2024-12-13 02:04:12.858 [INFO][4297] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af" Dec 13 02:04:12.886763 env[1212]: 2024-12-13 02:04:12.858 [INFO][4297] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af" iface="eth0" netns="" Dec 13 02:04:12.886763 env[1212]: 2024-12-13 02:04:12.858 [INFO][4297] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af" Dec 13 02:04:12.886763 env[1212]: 2024-12-13 02:04:12.858 [INFO][4297] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af" Dec 13 02:04:12.886763 env[1212]: 2024-12-13 02:04:12.877 [INFO][4304] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af" HandleID="k8s-pod-network.c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af" Workload="localhost-k8s-calico--kube--controllers--784649585b--dmq4n-eth0" Dec 13 02:04:12.886763 env[1212]: 2024-12-13 02:04:12.877 [INFO][4304] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:04:12.886763 env[1212]: 2024-12-13 02:04:12.877 [INFO][4304] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:04:12.886763 env[1212]: 2024-12-13 02:04:12.883 [WARNING][4304] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af" HandleID="k8s-pod-network.c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af" Workload="localhost-k8s-calico--kube--controllers--784649585b--dmq4n-eth0" Dec 13 02:04:12.886763 env[1212]: 2024-12-13 02:04:12.883 [INFO][4304] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af" HandleID="k8s-pod-network.c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af" Workload="localhost-k8s-calico--kube--controllers--784649585b--dmq4n-eth0" Dec 13 02:04:12.886763 env[1212]: 2024-12-13 02:04:12.884 [INFO][4304] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:04:12.886763 env[1212]: 2024-12-13 02:04:12.885 [INFO][4297] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af" Dec 13 02:04:12.887235 env[1212]: time="2024-12-13T02:04:12.886792325Z" level=info msg="TearDown network for sandbox \"c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af\" successfully" Dec 13 02:04:12.887235 env[1212]: time="2024-12-13T02:04:12.886829847Z" level=info msg="StopPodSandbox for \"c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af\" returns successfully" Dec 13 02:04:12.887371 env[1212]: time="2024-12-13T02:04:12.887338552Z" level=info msg="RemovePodSandbox for \"c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af\"" Dec 13 02:04:12.887431 env[1212]: time="2024-12-13T02:04:12.887381345Z" level=info msg="Forcibly stopping sandbox \"c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af\"" Dec 13 02:04:12.941871 env[1212]: 2024-12-13 02:04:12.916 [WARNING][4326] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--784649585b--dmq4n-eth0", GenerateName:"calico-kube-controllers-784649585b-", Namespace:"calico-system", SelfLink:"", UID:"ba1c6a87-03d0-4fc7-8058-05b0fe24f8ff", ResourceVersion:"951", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 3, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"784649585b", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c70d8344fffe18c2d61329f7869fccae592a7b4d0af31aee093e6953569b165f", Pod:"calico-kube-controllers-784649585b-dmq4n", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calia9ec47c4d0c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:04:12.941871 env[1212]: 2024-12-13 02:04:12.916 [INFO][4326] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af" Dec 13 02:04:12.941871 env[1212]: 2024-12-13 02:04:12.916 [INFO][4326] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af" iface="eth0" netns="" Dec 13 02:04:12.941871 env[1212]: 2024-12-13 02:04:12.916 [INFO][4326] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af" Dec 13 02:04:12.941871 env[1212]: 2024-12-13 02:04:12.916 [INFO][4326] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af" Dec 13 02:04:12.941871 env[1212]: 2024-12-13 02:04:12.932 [INFO][4333] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af" HandleID="k8s-pod-network.c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af" Workload="localhost-k8s-calico--kube--controllers--784649585b--dmq4n-eth0" Dec 13 02:04:12.941871 env[1212]: 2024-12-13 02:04:12.932 [INFO][4333] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:04:12.941871 env[1212]: 2024-12-13 02:04:12.932 [INFO][4333] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:04:12.941871 env[1212]: 2024-12-13 02:04:12.938 [WARNING][4333] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af" HandleID="k8s-pod-network.c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af" Workload="localhost-k8s-calico--kube--controllers--784649585b--dmq4n-eth0" Dec 13 02:04:12.941871 env[1212]: 2024-12-13 02:04:12.938 [INFO][4333] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af" HandleID="k8s-pod-network.c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af" Workload="localhost-k8s-calico--kube--controllers--784649585b--dmq4n-eth0" Dec 13 02:04:12.941871 env[1212]: 2024-12-13 02:04:12.939 [INFO][4333] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:04:12.941871 env[1212]: 2024-12-13 02:04:12.940 [INFO][4326] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af" Dec 13 02:04:12.942691 env[1212]: time="2024-12-13T02:04:12.942650302Z" level=info msg="TearDown network for sandbox \"c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af\" successfully" Dec 13 02:04:12.946954 env[1212]: time="2024-12-13T02:04:12.946919969Z" level=info msg="RemovePodSandbox \"c826728686dc9fa43ed3f117be6d183643188453feef58a02ab045a71b37c2af\" returns successfully" Dec 13 02:04:12.947219 env[1212]: time="2024-12-13T02:04:12.947198558Z" level=info msg="StopPodSandbox for \"511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460\"" Dec 13 02:04:13.008622 env[1212]: 2024-12-13 02:04:12.975 [WARNING][4355] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7bffbb6c48--lhwh7-eth0", GenerateName:"calico-apiserver-7bffbb6c48-", Namespace:"calico-apiserver", SelfLink:"", UID:"d9b9f041-0447-4f1c-aa10-5116ff6c6616", ResourceVersion:"938", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 3, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7bffbb6c48", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c873e8014e9c4fcdbcc834eeb54c5eed0803756b529fcb4770afe8fedc0e3dca", Pod:"calico-apiserver-7bffbb6c48-lhwh7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8b1683020dd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:04:13.008622 env[1212]: 2024-12-13 02:04:12.975 [INFO][4355] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460" Dec 13 02:04:13.008622 env[1212]: 2024-12-13 02:04:12.975 [INFO][4355] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460" iface="eth0" netns="" Dec 13 02:04:13.008622 env[1212]: 2024-12-13 02:04:12.975 [INFO][4355] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460" Dec 13 02:04:13.008622 env[1212]: 2024-12-13 02:04:12.975 [INFO][4355] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460" Dec 13 02:04:13.008622 env[1212]: 2024-12-13 02:04:12.997 [INFO][4362] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460" HandleID="k8s-pod-network.511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460" Workload="localhost-k8s-calico--apiserver--7bffbb6c48--lhwh7-eth0" Dec 13 02:04:13.008622 env[1212]: 2024-12-13 02:04:12.998 [INFO][4362] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:04:13.008622 env[1212]: 2024-12-13 02:04:12.998 [INFO][4362] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:04:13.008622 env[1212]: 2024-12-13 02:04:13.002 [WARNING][4362] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460" HandleID="k8s-pod-network.511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460" Workload="localhost-k8s-calico--apiserver--7bffbb6c48--lhwh7-eth0" Dec 13 02:04:13.008622 env[1212]: 2024-12-13 02:04:13.002 [INFO][4362] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460" HandleID="k8s-pod-network.511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460" Workload="localhost-k8s-calico--apiserver--7bffbb6c48--lhwh7-eth0" Dec 13 02:04:13.008622 env[1212]: 2024-12-13 02:04:13.003 [INFO][4362] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:04:13.008622 env[1212]: 2024-12-13 02:04:13.005 [INFO][4355] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460" Dec 13 02:04:13.008622 env[1212]: time="2024-12-13T02:04:13.006403878Z" level=info msg="TearDown network for sandbox \"511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460\" successfully" Dec 13 02:04:13.008622 env[1212]: time="2024-12-13T02:04:13.006432273Z" level=info msg="StopPodSandbox for \"511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460\" returns successfully" Dec 13 02:04:13.008622 env[1212]: time="2024-12-13T02:04:13.006706643Z" level=info msg="RemovePodSandbox for \"511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460\"" Dec 13 02:04:13.008622 env[1212]: time="2024-12-13T02:04:13.006732383Z" level=info msg="Forcibly stopping sandbox \"511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460\"" Dec 13 02:04:13.059378 env[1212]: 2024-12-13 02:04:13.033 [WARNING][4383] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7bffbb6c48--lhwh7-eth0", GenerateName:"calico-apiserver-7bffbb6c48-", Namespace:"calico-apiserver", SelfLink:"", UID:"d9b9f041-0447-4f1c-aa10-5116ff6c6616", ResourceVersion:"938", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 3, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7bffbb6c48", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c873e8014e9c4fcdbcc834eeb54c5eed0803756b529fcb4770afe8fedc0e3dca", Pod:"calico-apiserver-7bffbb6c48-lhwh7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8b1683020dd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:04:13.059378 env[1212]: 2024-12-13 02:04:13.033 [INFO][4383] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460" Dec 13 02:04:13.059378 env[1212]: 2024-12-13 02:04:13.033 [INFO][4383] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460" iface="eth0" netns="" Dec 13 02:04:13.059378 env[1212]: 2024-12-13 02:04:13.033 [INFO][4383] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460" Dec 13 02:04:13.059378 env[1212]: 2024-12-13 02:04:13.033 [INFO][4383] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460" Dec 13 02:04:13.059378 env[1212]: 2024-12-13 02:04:13.051 [INFO][4391] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460" HandleID="k8s-pod-network.511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460" Workload="localhost-k8s-calico--apiserver--7bffbb6c48--lhwh7-eth0" Dec 13 02:04:13.059378 env[1212]: 2024-12-13 02:04:13.051 [INFO][4391] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:04:13.059378 env[1212]: 2024-12-13 02:04:13.051 [INFO][4391] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:04:13.059378 env[1212]: 2024-12-13 02:04:13.056 [WARNING][4391] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460" HandleID="k8s-pod-network.511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460" Workload="localhost-k8s-calico--apiserver--7bffbb6c48--lhwh7-eth0" Dec 13 02:04:13.059378 env[1212]: 2024-12-13 02:04:13.056 [INFO][4391] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460" HandleID="k8s-pod-network.511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460" Workload="localhost-k8s-calico--apiserver--7bffbb6c48--lhwh7-eth0" Dec 13 02:04:13.059378 env[1212]: 2024-12-13 02:04:13.057 [INFO][4391] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:04:13.059378 env[1212]: 2024-12-13 02:04:13.058 [INFO][4383] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460" Dec 13 02:04:13.059814 env[1212]: time="2024-12-13T02:04:13.059403722Z" level=info msg="TearDown network for sandbox \"511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460\" successfully" Dec 13 02:04:13.062606 env[1212]: time="2024-12-13T02:04:13.062584476Z" level=info msg="RemovePodSandbox \"511e07ef92a6aabe10d09f2a295fa4eb60536984ed857a8cc2d6e624dd9d4460\" returns successfully" Dec 13 02:04:13.957962 systemd[1]: Started sshd@15-10.0.0.89:22-10.0.0.1:33228.service. Dec 13 02:04:13.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.89:22-10.0.0.1:33228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:13.959552 kernel: kauditd_printk_skb: 843 callbacks suppressed Dec 13 02:04:13.959614 kernel: audit: type=1130 audit(1734055453.957:1276): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.89:22-10.0.0.1:33228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:13.999000 audit[4400]: USER_ACCT pid=4400 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:14.000460 sshd[4400]: Accepted publickey for core from 10.0.0.1 port 33228 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:04:14.004000 audit[4400]: CRED_ACQ pid=4400 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:14.005977 sshd[4400]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:04:14.011681 kernel: audit: type=1101 audit(1734055453.999:1277): pid=4400 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:14.011760 kernel: audit: type=1103 audit(1734055454.004:1278): pid=4400 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:14.011786 kernel: audit: type=1006 audit(1734055454.004:1279): pid=4400 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Dec 13 02:04:14.011345 systemd[1]: Started session-16.scope. Dec 13 02:04:14.012866 systemd-logind[1199]: New session 16 of user core. Dec 13 02:04:14.014055 kernel: audit: type=1300 audit(1734055454.004:1279): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb655e3e0 a2=3 a3=0 items=0 ppid=1 pid=4400 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:14.004000 audit[4400]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb655e3e0 a2=3 a3=0 items=0 ppid=1 pid=4400 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:14.004000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:04:14.020960 kernel: audit: type=1327 audit(1734055454.004:1279): proctitle=737368643A20636F7265205B707269765D Dec 13 02:04:14.025519 kernel: audit: type=1105 audit(1734055454.018:1280): pid=4400 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:14.018000 audit[4400]: USER_START pid=4400 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:14.029182 kernel: audit: type=1103 audit(1734055454.019:1281): pid=4402 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:14.019000 audit[4402]: CRED_ACQ pid=4402 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:14.145704 sshd[4400]: pam_unix(sshd:session): session closed for user core Dec 13 02:04:14.145000 audit[4400]: USER_END pid=4400 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:14.148172 systemd[1]: sshd@15-10.0.0.89:22-10.0.0.1:33228.service: Deactivated successfully. Dec 13 02:04:14.148911 systemd[1]: session-16.scope: Deactivated successfully. Dec 13 02:04:14.151714 systemd-logind[1199]: Session 16 logged out. Waiting for processes to exit. Dec 13 02:04:14.151976 kernel: audit: type=1106 audit(1734055454.145:1282): pid=4400 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:14.145000 audit[4400]: CRED_DISP pid=4400 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:14.147000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.89:22-10.0.0.1:33228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:14.152470 systemd-logind[1199]: Removed session 16. Dec 13 02:04:14.155910 kernel: audit: type=1104 audit(1734055454.145:1283): pid=4400 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:14.751100 env[1212]: time="2024-12-13T02:04:14.751046105Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:14.753285 env[1212]: time="2024-12-13T02:04:14.753242030Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:14.754955 env[1212]: time="2024-12-13T02:04:14.754907780Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:14.756530 env[1212]: time="2024-12-13T02:04:14.756494156Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:14.756922 env[1212]: time="2024-12-13T02:04:14.756877036Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 02:04:14.758457 env[1212]: time="2024-12-13T02:04:14.758417433Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 02:04:14.759608 env[1212]: time="2024-12-13T02:04:14.759569951Z" level=info msg="CreateContainer within sandbox \"c5425d877dba5a3f3b8f737e22398717e30351069855f064bfc0f1dae090393a\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 02:04:14.769055 kubelet[2056]: E1213 02:04:14.769025 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:04:14.774901 env[1212]: time="2024-12-13T02:04:14.774800268Z" level=info msg="CreateContainer within sandbox \"c5425d877dba5a3f3b8f737e22398717e30351069855f064bfc0f1dae090393a\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"f980dc52d8f1b78eaeb5a0ca4f138ad98252299061d3d49593f7989fcb7ee6e9\"" Dec 13 02:04:14.775970 env[1212]: time="2024-12-13T02:04:14.775470965Z" level=info msg="StartContainer for \"f980dc52d8f1b78eaeb5a0ca4f138ad98252299061d3d49593f7989fcb7ee6e9\"" Dec 13 02:04:14.791751 systemd[1]: Started cri-containerd-f980dc52d8f1b78eaeb5a0ca4f138ad98252299061d3d49593f7989fcb7ee6e9.scope. Dec 13 02:04:14.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:14.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:14.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:14.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:14.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:14.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:14.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:14.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:14.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:14.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:14.801000 audit: BPF prog-id=178 op=LOAD Dec 13 02:04:14.802000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:14.802000 audit[4441]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3603 pid=4441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:14.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639383064633532643866316237386561656235613063613466313338 Dec 13 02:04:14.802000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:14.802000 audit[4441]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3603 pid=4441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:14.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639383064633532643866316237386561656235613063613466313338 Dec 13 02:04:14.802000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:14.802000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:14.802000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:14.802000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:14.802000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:14.802000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:14.802000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:14.802000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:14.802000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:14.802000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:14.802000 audit: BPF prog-id=179 op=LOAD Dec 13 02:04:14.802000 audit[4441]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002cfd10 items=0 ppid=3603 pid=4441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:14.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639383064633532643866316237386561656235613063613466313338 Dec 13 02:04:14.802000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:14.802000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:14.802000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:14.802000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:14.802000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:14.802000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:14.802000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:14.802000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:14.802000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:14.802000 audit: BPF prog-id=180 op=LOAD Dec 13 02:04:14.802000 audit[4441]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002cfd58 items=0 ppid=3603 pid=4441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:14.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639383064633532643866316237386561656235613063613466313338 Dec 13 02:04:14.802000 audit: BPF prog-id=180 op=UNLOAD Dec 13 02:04:14.802000 audit: BPF prog-id=179 op=UNLOAD Dec 13 02:04:14.802000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:14.802000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:14.802000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:14.802000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:14.802000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:14.802000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:14.802000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:14.802000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:14.802000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:14.802000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:14.802000 audit: BPF prog-id=181 op=LOAD Dec 13 02:04:14.802000 audit[4441]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000338168 items=0 ppid=3603 pid=4441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:14.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639383064633532643866316237386561656235613063613466313338 Dec 13 02:04:14.868707 env[1212]: time="2024-12-13T02:04:14.868632218Z" level=info msg="StartContainer for \"f980dc52d8f1b78eaeb5a0ca4f138ad98252299061d3d49593f7989fcb7ee6e9\" returns successfully" Dec 13 02:04:15.119000 audit[4479]: NETFILTER_CFG table=filter:103 family=2 entries=16 op=nft_register_rule pid=4479 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:04:15.119000 audit[4479]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffff0846df0 a2=0 a3=7ffff0846ddc items=0 ppid=2232 pid=4479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:15.119000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:04:15.124000 audit[4479]: NETFILTER_CFG table=nat:104 family=2 entries=14 op=nft_register_rule pid=4479 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:04:15.124000 audit[4479]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffff0846df0 a2=0 a3=0 items=0 ppid=2232 pid=4479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:15.124000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:04:15.835000 audit[4451]: AVC avc: denied { watch } for pid=4451 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_03_54.2974818936/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c416,c702 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c416,c702 tclass=file permissive=0 Dec 13 02:04:15.835000 audit[4451]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000360da0 a2=fc6 a3=0 items=0 ppid=3603 pid=4451 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c416,c702 key=(null) Dec 13 02:04:15.835000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:04:16.019853 kubelet[2056]: I1213 02:04:16.019820 2056 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 02:04:17.027025 env[1212]: time="2024-12-13T02:04:17.026948010Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:17.031010 env[1212]: time="2024-12-13T02:04:17.030823322Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:17.033499 env[1212]: time="2024-12-13T02:04:17.033403458Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:17.036676 env[1212]: time="2024-12-13T02:04:17.036536208Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:17.037184 env[1212]: time="2024-12-13T02:04:17.037123851Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 02:04:17.041574 env[1212]: time="2024-12-13T02:04:17.041533204Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 02:04:17.044130 env[1212]: time="2024-12-13T02:04:17.044089984Z" level=info msg="CreateContainer within sandbox \"547b7c9366996a02007b48ae49dc14308f500976faa42822dec13fdeac9fd925\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 02:04:17.078111 env[1212]: time="2024-12-13T02:04:17.078025399Z" level=info msg="CreateContainer within sandbox \"547b7c9366996a02007b48ae49dc14308f500976faa42822dec13fdeac9fd925\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"4b306786b8cac998d10ad1a9100df7ac3efd8633d8ddd4e090c323213995eddd\"" Dec 13 02:04:17.079483 env[1212]: time="2024-12-13T02:04:17.079438935Z" level=info msg="StartContainer for \"4b306786b8cac998d10ad1a9100df7ac3efd8633d8ddd4e090c323213995eddd\"" Dec 13 02:04:17.103574 systemd[1]: run-containerd-runc-k8s.io-4b306786b8cac998d10ad1a9100df7ac3efd8633d8ddd4e090c323213995eddd-runc.ODvKlq.mount: Deactivated successfully. Dec 13 02:04:17.105646 systemd[1]: Started cri-containerd-4b306786b8cac998d10ad1a9100df7ac3efd8633d8ddd4e090c323213995eddd.scope. Dec 13 02:04:17.119000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.119000 audit[4489]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f5d12be4728 items=0 ppid=4011 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:17.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462333036373836623863616339393864313061643161393130306466 Dec 13 02:04:17.120000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.120000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.120000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.120000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.120000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.120000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.120000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.120000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.120000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.120000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.120000 audit: BPF prog-id=182 op=LOAD Dec 13 02:04:17.120000 audit[4489]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0003ba388 items=0 ppid=4011 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:17.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462333036373836623863616339393864313061643161393130306466 Dec 13 02:04:17.123000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.123000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.123000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.123000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.123000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.123000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.123000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.123000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.123000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.123000 audit: BPF prog-id=183 op=LOAD Dec 13 02:04:17.123000 audit[4489]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0003ba3d8 items=0 ppid=4011 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:17.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462333036373836623863616339393864313061643161393130306466 Dec 13 02:04:17.124000 audit: BPF prog-id=183 op=UNLOAD Dec 13 02:04:17.124000 audit: BPF prog-id=182 op=UNLOAD Dec 13 02:04:17.124000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.124000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.124000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.124000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.124000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.124000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.124000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.124000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.124000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.124000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.124000 audit: BPF prog-id=184 op=LOAD Dec 13 02:04:17.124000 audit[4489]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0003ba468 items=0 ppid=4011 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:17.124000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462333036373836623863616339393864313061643161393130306466 Dec 13 02:04:17.146113 env[1212]: time="2024-12-13T02:04:17.146027435Z" level=info msg="StartContainer for \"4b306786b8cac998d10ad1a9100df7ac3efd8633d8ddd4e090c323213995eddd\" returns successfully" Dec 13 02:04:17.837604 env[1212]: time="2024-12-13T02:04:17.837537595Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:17.841928 env[1212]: time="2024-12-13T02:04:17.841866211Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:17.843857 env[1212]: time="2024-12-13T02:04:17.843801614Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:17.845796 env[1212]: time="2024-12-13T02:04:17.845742126Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:17.846386 env[1212]: time="2024-12-13T02:04:17.846337513Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 02:04:17.847985 env[1212]: time="2024-12-13T02:04:17.847937689Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 02:04:17.849018 env[1212]: time="2024-12-13T02:04:17.848966814Z" level=info msg="CreateContainer within sandbox \"c873e8014e9c4fcdbcc834eeb54c5eed0803756b529fcb4770afe8fedc0e3dca\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 02:04:17.865841 env[1212]: time="2024-12-13T02:04:17.865774573Z" level=info msg="CreateContainer within sandbox \"c873e8014e9c4fcdbcc834eeb54c5eed0803756b529fcb4770afe8fedc0e3dca\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"3c00c3c986fbda4579bd2e7e59d1614cbc2a88429f46931c038d6ccff4dc22ad\"" Dec 13 02:04:17.866434 env[1212]: time="2024-12-13T02:04:17.866395580Z" level=info msg="StartContainer for \"3c00c3c986fbda4579bd2e7e59d1614cbc2a88429f46931c038d6ccff4dc22ad\"" Dec 13 02:04:17.882344 systemd[1]: Started cri-containerd-3c00c3c986fbda4579bd2e7e59d1614cbc2a88429f46931c038d6ccff4dc22ad.scope. Dec 13 02:04:17.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.894000 audit: BPF prog-id=185 op=LOAD Dec 13 02:04:17.894000 audit[4523]: AVC avc: denied { bpf } for pid=4523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.894000 audit[4523]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4054 pid=4523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:17.894000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363303063336339383666626461343537396264326537653539643136 Dec 13 02:04:17.894000 audit[4523]: AVC avc: denied { perfmon } for pid=4523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.894000 audit[4523]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4054 pid=4523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:17.894000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363303063336339383666626461343537396264326537653539643136 Dec 13 02:04:17.895000 audit[4523]: AVC avc: denied { bpf } for pid=4523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.895000 audit[4523]: AVC avc: denied { bpf } for pid=4523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.895000 audit[4523]: AVC avc: denied { bpf } for pid=4523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.895000 audit[4523]: AVC avc: denied { perfmon } for pid=4523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.895000 audit[4523]: AVC avc: denied { perfmon } for pid=4523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.895000 audit[4523]: AVC avc: denied { perfmon } for pid=4523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.895000 audit[4523]: AVC avc: denied { perfmon } for pid=4523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.895000 audit[4523]: AVC avc: denied { perfmon } for pid=4523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.895000 audit[4523]: AVC avc: denied { bpf } for pid=4523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.895000 audit[4523]: AVC avc: denied { bpf } for pid=4523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.895000 audit: BPF prog-id=186 op=LOAD Dec 13 02:04:17.895000 audit[4523]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003d0020 items=0 ppid=4054 pid=4523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:17.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363303063336339383666626461343537396264326537653539643136 Dec 13 02:04:17.895000 audit[4523]: AVC avc: denied { bpf } for pid=4523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.895000 audit[4523]: AVC avc: denied { bpf } for pid=4523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.895000 audit[4523]: AVC avc: denied { perfmon } for pid=4523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.895000 audit[4523]: AVC avc: denied { perfmon } for pid=4523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.895000 audit[4523]: AVC avc: denied { perfmon } for pid=4523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.895000 audit[4523]: AVC avc: denied { perfmon } for pid=4523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.895000 audit[4523]: AVC avc: denied { perfmon } for pid=4523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.895000 audit[4523]: AVC avc: denied { bpf } for pid=4523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.895000 audit[4523]: AVC avc: denied { bpf } for pid=4523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.895000 audit: BPF prog-id=187 op=LOAD Dec 13 02:04:17.895000 audit[4523]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003d0068 items=0 ppid=4054 pid=4523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:17.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363303063336339383666626461343537396264326537653539643136 Dec 13 02:04:17.895000 audit: BPF prog-id=187 op=UNLOAD Dec 13 02:04:17.895000 audit: BPF prog-id=186 op=UNLOAD Dec 13 02:04:17.895000 audit[4523]: AVC avc: denied { bpf } for pid=4523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.895000 audit[4523]: AVC avc: denied { bpf } for pid=4523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.895000 audit[4523]: AVC avc: denied { bpf } for pid=4523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.895000 audit[4523]: AVC avc: denied { perfmon } for pid=4523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.895000 audit[4523]: AVC avc: denied { perfmon } for pid=4523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.895000 audit[4523]: AVC avc: denied { perfmon } for pid=4523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.895000 audit[4523]: AVC avc: denied { perfmon } for pid=4523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.895000 audit[4523]: AVC avc: denied { perfmon } for pid=4523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.895000 audit[4523]: AVC avc: denied { bpf } for pid=4523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.895000 audit[4523]: AVC avc: denied { bpf } for pid=4523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:17.895000 audit: BPF prog-id=188 op=LOAD Dec 13 02:04:17.895000 audit[4523]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003d0478 items=0 ppid=4054 pid=4523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:17.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363303063336339383666626461343537396264326537653539643136 Dec 13 02:04:17.926606 env[1212]: time="2024-12-13T02:04:17.926535315Z" level=info msg="StartContainer for \"3c00c3c986fbda4579bd2e7e59d1614cbc2a88429f46931c038d6ccff4dc22ad\" returns successfully" Dec 13 02:04:18.039630 kubelet[2056]: I1213 02:04:18.039103 2056 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7bffbb6c48-lhwh7" podStartSLOduration=36.383464415 podStartE2EDuration="43.039081878s" podCreationTimestamp="2024-12-13 02:03:35 +0000 UTC" firstStartedPulling="2024-12-13 02:04:11.191633512 +0000 UTC m=+58.770318516" lastFinishedPulling="2024-12-13 02:04:17.847250975 +0000 UTC m=+65.425935979" observedRunningTime="2024-12-13 02:04:18.038238131 +0000 UTC m=+65.616923146" watchObservedRunningTime="2024-12-13 02:04:18.039081878 +0000 UTC m=+65.617766882" Dec 13 02:04:18.039630 kubelet[2056]: I1213 02:04:18.039454 2056 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7bffbb6c48-67kk2" podStartSLOduration=37.375100938 podStartE2EDuration="43.039449406s" podCreationTimestamp="2024-12-13 02:03:35 +0000 UTC" firstStartedPulling="2024-12-13 02:04:09.093456501 +0000 UTC m=+56.672141506" lastFinishedPulling="2024-12-13 02:04:14.75780497 +0000 UTC m=+62.336489974" observedRunningTime="2024-12-13 02:04:15.037817364 +0000 UTC m=+62.616502378" watchObservedRunningTime="2024-12-13 02:04:18.039449406 +0000 UTC m=+65.618134420" Dec 13 02:04:18.057000 audit[4555]: NETFILTER_CFG table=filter:105 family=2 entries=16 op=nft_register_rule pid=4555 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:04:18.057000 audit[4555]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffff39ebc70 a2=0 a3=7ffff39ebc5c items=0 ppid=2232 pid=4555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:18.057000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:04:18.061000 audit[4555]: NETFILTER_CFG table=nat:106 family=2 entries=14 op=nft_register_rule pid=4555 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:04:18.061000 audit[4555]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffff39ebc70 a2=0 a3=0 items=0 ppid=2232 pid=4555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:18.061000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:04:18.674000 audit[4534]: AVC avc: denied { watch } for pid=4534 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_03_54.2496291118/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c384,c687 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c384,c687 tclass=file permissive=0 Dec 13 02:04:18.674000 audit[4534]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000e80360 a2=fc6 a3=0 items=0 ppid=4054 pid=4534 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c384,c687 key=(null) Dec 13 02:04:18.674000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:04:19.029729 kubelet[2056]: I1213 02:04:19.029626 2056 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 02:04:19.150527 systemd[1]: Started sshd@16-10.0.0.89:22-10.0.0.1:59102.service. Dec 13 02:04:19.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.89:22-10.0.0.1:59102 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:19.151584 kernel: kauditd_printk_skb: 176 callbacks suppressed Dec 13 02:04:19.151636 kernel: audit: type=1130 audit(1734055459.149:1333): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.89:22-10.0.0.1:59102 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:19.194000 audit[4558]: USER_ACCT pid=4558 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:19.197907 sshd[4558]: Accepted publickey for core from 10.0.0.1 port 59102 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:04:19.198000 audit[4558]: CRED_ACQ pid=4558 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:19.200122 sshd[4558]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:04:19.203444 kernel: audit: type=1101 audit(1734055459.194:1334): pid=4558 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:19.203500 kernel: audit: type=1103 audit(1734055459.198:1335): pid=4558 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:19.204822 systemd[1]: Started session-17.scope. Dec 13 02:04:19.205457 systemd-logind[1199]: New session 17 of user core. Dec 13 02:04:19.209701 kernel: audit: type=1006 audit(1734055459.198:1336): pid=4558 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Dec 13 02:04:19.209737 kernel: audit: type=1300 audit(1734055459.198:1336): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe030cece0 a2=3 a3=0 items=0 ppid=1 pid=4558 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:19.198000 audit[4558]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe030cece0 a2=3 a3=0 items=0 ppid=1 pid=4558 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:19.198000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:04:19.211166 kernel: audit: type=1327 audit(1734055459.198:1336): proctitle=737368643A20636F7265205B707269765D Dec 13 02:04:19.209000 audit[4558]: USER_START pid=4558 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:19.215540 kernel: audit: type=1105 audit(1734055459.209:1337): pid=4558 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:19.210000 audit[4560]: CRED_ACQ pid=4560 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:19.218937 kernel: audit: type=1103 audit(1734055459.210:1338): pid=4560 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:19.268011 env[1212]: time="2024-12-13T02:04:19.267961112Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:19.270025 env[1212]: time="2024-12-13T02:04:19.270000809Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:19.272358 env[1212]: time="2024-12-13T02:04:19.271472533Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:19.273521 env[1212]: time="2024-12-13T02:04:19.273500969Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:19.274119 env[1212]: time="2024-12-13T02:04:19.273785767Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 02:04:19.276225 env[1212]: time="2024-12-13T02:04:19.276205125Z" level=info msg="CreateContainer within sandbox \"547b7c9366996a02007b48ae49dc14308f500976faa42822dec13fdeac9fd925\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 02:04:19.289404 env[1212]: time="2024-12-13T02:04:19.289301871Z" level=info msg="CreateContainer within sandbox \"547b7c9366996a02007b48ae49dc14308f500976faa42822dec13fdeac9fd925\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"f88eb1ef9887b0732f4258acb2c6e2503d101a21802c5b6c3208e6bd71d106fc\"" Dec 13 02:04:19.291129 env[1212]: time="2024-12-13T02:04:19.290007551Z" level=info msg="StartContainer for \"f88eb1ef9887b0732f4258acb2c6e2503d101a21802c5b6c3208e6bd71d106fc\"" Dec 13 02:04:19.315537 systemd[1]: Started cri-containerd-f88eb1ef9887b0732f4258acb2c6e2503d101a21802c5b6c3208e6bd71d106fc.scope. Dec 13 02:04:19.336000 audit[4577]: AVC avc: denied { perfmon } for pid=4577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:19.338030 sshd[4558]: pam_unix(sshd:session): session closed for user core Dec 13 02:04:19.336000 audit[4577]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f1cc4fc7988 items=0 ppid=4011 pid=4577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:19.342236 systemd[1]: sshd@16-10.0.0.89:22-10.0.0.1:59102.service: Deactivated successfully. Dec 13 02:04:19.343075 systemd[1]: session-17.scope: Deactivated successfully. Dec 13 02:04:19.344209 systemd-logind[1199]: Session 17 logged out. Waiting for processes to exit. Dec 13 02:04:19.345703 systemd-logind[1199]: Removed session 17. Dec 13 02:04:19.346184 kernel: audit: type=1400 audit(1734055459.336:1339): avc: denied { perfmon } for pid=4577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:19.346346 kernel: audit: type=1300 audit(1734055459.336:1339): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f1cc4fc7988 items=0 ppid=4011 pid=4577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:19.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638386562316566393838376230373332663432353861636232633665 Dec 13 02:04:19.336000 audit[4577]: AVC avc: denied { bpf } for pid=4577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:19.336000 audit[4577]: AVC avc: denied { bpf } for pid=4577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:19.336000 audit[4577]: AVC avc: denied { bpf } for pid=4577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:19.336000 audit[4577]: AVC avc: denied { perfmon } for pid=4577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:19.336000 audit[4577]: AVC avc: denied { perfmon } for pid=4577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:19.336000 audit[4577]: AVC avc: denied { perfmon } for pid=4577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:19.336000 audit[4577]: AVC avc: denied { perfmon } for pid=4577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:19.336000 audit[4577]: AVC avc: denied { perfmon } for pid=4577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:19.336000 audit[4577]: AVC avc: denied { bpf } for pid=4577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:19.336000 audit[4558]: USER_END pid=4558 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:19.336000 audit[4558]: CRED_DISP pid=4558 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:19.340000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.89:22-10.0.0.1:59102 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:19.336000 audit[4577]: AVC avc: denied { bpf } for pid=4577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:19.336000 audit: BPF prog-id=189 op=LOAD Dec 13 02:04:19.336000 audit[4577]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c00010ad08 items=0 ppid=4011 pid=4577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:19.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638386562316566393838376230373332663432353861636232633665 Dec 13 02:04:19.345000 audit[4577]: AVC avc: denied { bpf } for pid=4577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:19.345000 audit[4577]: AVC avc: denied { bpf } for pid=4577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:19.345000 audit[4577]: AVC avc: denied { perfmon } for pid=4577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:19.345000 audit[4577]: AVC avc: denied { perfmon } for pid=4577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:19.345000 audit[4577]: AVC avc: denied { perfmon } for pid=4577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:19.345000 audit[4577]: AVC avc: denied { perfmon } for pid=4577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:19.345000 audit[4577]: AVC avc: denied { perfmon } for pid=4577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:19.345000 audit[4577]: AVC avc: denied { bpf } for pid=4577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:19.345000 audit[4577]: AVC avc: denied { bpf } for pid=4577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:19.345000 audit: BPF prog-id=190 op=LOAD Dec 13 02:04:19.345000 audit[4577]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c00010ad58 items=0 ppid=4011 pid=4577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:19.345000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638386562316566393838376230373332663432353861636232633665 Dec 13 02:04:19.345000 audit: BPF prog-id=190 op=UNLOAD Dec 13 02:04:19.345000 audit: BPF prog-id=189 op=UNLOAD Dec 13 02:04:19.345000 audit[4577]: AVC avc: denied { bpf } for pid=4577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:19.345000 audit[4577]: AVC avc: denied { bpf } for pid=4577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:19.345000 audit[4577]: AVC avc: denied { bpf } for pid=4577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:19.345000 audit[4577]: AVC avc: denied { perfmon } for pid=4577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:19.345000 audit[4577]: AVC avc: denied { perfmon } for pid=4577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:19.345000 audit[4577]: AVC avc: denied { perfmon } for pid=4577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:19.345000 audit[4577]: AVC avc: denied { perfmon } for pid=4577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:19.345000 audit[4577]: AVC avc: denied { perfmon } for pid=4577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:19.345000 audit[4577]: AVC avc: denied { bpf } for pid=4577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:19.345000 audit[4577]: AVC avc: denied { bpf } for pid=4577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:19.345000 audit: BPF prog-id=191 op=LOAD Dec 13 02:04:19.345000 audit[4577]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c00010ade8 items=0 ppid=4011 pid=4577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:19.345000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638386562316566393838376230373332663432353861636232633665 Dec 13 02:04:19.505483 env[1212]: time="2024-12-13T02:04:19.505414732Z" level=info msg="StopPodSandbox for \"9d95f3ac6d19a4df2019b6f9ef3a3722032c276b32d80996442800cc1b0788ab\"" Dec 13 02:04:19.555021 env[1212]: time="2024-12-13T02:04:19.554879674Z" level=info msg="StartContainer for \"f88eb1ef9887b0732f4258acb2c6e2503d101a21802c5b6c3208e6bd71d106fc\" returns successfully" Dec 13 02:04:19.592670 env[1212]: 2024-12-13 02:04:19.557 [INFO][4623] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9d95f3ac6d19a4df2019b6f9ef3a3722032c276b32d80996442800cc1b0788ab" Dec 13 02:04:19.592670 env[1212]: 2024-12-13 02:04:19.557 [INFO][4623] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="9d95f3ac6d19a4df2019b6f9ef3a3722032c276b32d80996442800cc1b0788ab" iface="eth0" netns="/var/run/netns/cni-7b632f29-ddd3-d6ee-c0db-18bc8a66a848" Dec 13 02:04:19.592670 env[1212]: 2024-12-13 02:04:19.558 [INFO][4623] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="9d95f3ac6d19a4df2019b6f9ef3a3722032c276b32d80996442800cc1b0788ab" iface="eth0" netns="/var/run/netns/cni-7b632f29-ddd3-d6ee-c0db-18bc8a66a848" Dec 13 02:04:19.592670 env[1212]: 2024-12-13 02:04:19.558 [INFO][4623] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="9d95f3ac6d19a4df2019b6f9ef3a3722032c276b32d80996442800cc1b0788ab" iface="eth0" netns="/var/run/netns/cni-7b632f29-ddd3-d6ee-c0db-18bc8a66a848" Dec 13 02:04:19.592670 env[1212]: 2024-12-13 02:04:19.558 [INFO][4623] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9d95f3ac6d19a4df2019b6f9ef3a3722032c276b32d80996442800cc1b0788ab" Dec 13 02:04:19.592670 env[1212]: 2024-12-13 02:04:19.558 [INFO][4623] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9d95f3ac6d19a4df2019b6f9ef3a3722032c276b32d80996442800cc1b0788ab" Dec 13 02:04:19.592670 env[1212]: 2024-12-13 02:04:19.580 [INFO][4633] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9d95f3ac6d19a4df2019b6f9ef3a3722032c276b32d80996442800cc1b0788ab" HandleID="k8s-pod-network.9d95f3ac6d19a4df2019b6f9ef3a3722032c276b32d80996442800cc1b0788ab" Workload="localhost-k8s-coredns--7db6d8ff4d--zt92j-eth0" Dec 13 02:04:19.592670 env[1212]: 2024-12-13 02:04:19.580 [INFO][4633] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:04:19.592670 env[1212]: 2024-12-13 02:04:19.580 [INFO][4633] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:04:19.592670 env[1212]: 2024-12-13 02:04:19.586 [WARNING][4633] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9d95f3ac6d19a4df2019b6f9ef3a3722032c276b32d80996442800cc1b0788ab" HandleID="k8s-pod-network.9d95f3ac6d19a4df2019b6f9ef3a3722032c276b32d80996442800cc1b0788ab" Workload="localhost-k8s-coredns--7db6d8ff4d--zt92j-eth0" Dec 13 02:04:19.592670 env[1212]: 2024-12-13 02:04:19.586 [INFO][4633] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9d95f3ac6d19a4df2019b6f9ef3a3722032c276b32d80996442800cc1b0788ab" HandleID="k8s-pod-network.9d95f3ac6d19a4df2019b6f9ef3a3722032c276b32d80996442800cc1b0788ab" Workload="localhost-k8s-coredns--7db6d8ff4d--zt92j-eth0" Dec 13 02:04:19.592670 env[1212]: 2024-12-13 02:04:19.588 [INFO][4633] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:04:19.592670 env[1212]: 2024-12-13 02:04:19.590 [INFO][4623] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9d95f3ac6d19a4df2019b6f9ef3a3722032c276b32d80996442800cc1b0788ab" Dec 13 02:04:19.593346 env[1212]: time="2024-12-13T02:04:19.592981025Z" level=info msg="TearDown network for sandbox \"9d95f3ac6d19a4df2019b6f9ef3a3722032c276b32d80996442800cc1b0788ab\" successfully" Dec 13 02:04:19.593346 env[1212]: time="2024-12-13T02:04:19.593037864Z" level=info msg="StopPodSandbox for \"9d95f3ac6d19a4df2019b6f9ef3a3722032c276b32d80996442800cc1b0788ab\" returns successfully" Dec 13 02:04:19.594170 kubelet[2056]: E1213 02:04:19.593755 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:04:19.594739 env[1212]: time="2024-12-13T02:04:19.594702340Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-zt92j,Uid:096d0d62-3df0-48d4-9215-f440b6837177,Namespace:kube-system,Attempt:1,}" Dec 13 02:04:19.595974 systemd[1]: run-netns-cni\x2d7b632f29\x2dddd3\x2dd6ee\x2dc0db\x2d18bc8a66a848.mount: Deactivated successfully. Dec 13 02:04:19.879748 systemd-networkd[1031]: cali2837a491f2a: Link UP Dec 13 02:04:19.882289 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:04:19.882957 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2837a491f2a: link becomes ready Dec 13 02:04:19.882586 systemd-networkd[1031]: cali2837a491f2a: Gained carrier Dec 13 02:04:19.946726 env[1212]: 2024-12-13 02:04:19.660 [INFO][4641] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--7db6d8ff4d--zt92j-eth0 coredns-7db6d8ff4d- kube-system 096d0d62-3df0-48d4-9215-f440b6837177 1008 0 2024-12-13 02:03:26 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-7db6d8ff4d-zt92j eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali2837a491f2a [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="fca302ce09017c28a3213b9d390fde5a3ac02336344e5d765c27e769e99f1146" Namespace="kube-system" Pod="coredns-7db6d8ff4d-zt92j" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--zt92j-" Dec 13 02:04:19.946726 env[1212]: 2024-12-13 02:04:19.660 [INFO][4641] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="fca302ce09017c28a3213b9d390fde5a3ac02336344e5d765c27e769e99f1146" Namespace="kube-system" Pod="coredns-7db6d8ff4d-zt92j" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--zt92j-eth0" Dec 13 02:04:19.946726 env[1212]: 2024-12-13 02:04:19.701 [INFO][4655] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="fca302ce09017c28a3213b9d390fde5a3ac02336344e5d765c27e769e99f1146" HandleID="k8s-pod-network.fca302ce09017c28a3213b9d390fde5a3ac02336344e5d765c27e769e99f1146" Workload="localhost-k8s-coredns--7db6d8ff4d--zt92j-eth0" Dec 13 02:04:19.946726 env[1212]: 2024-12-13 02:04:19.709 [INFO][4655] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="fca302ce09017c28a3213b9d390fde5a3ac02336344e5d765c27e769e99f1146" HandleID="k8s-pod-network.fca302ce09017c28a3213b9d390fde5a3ac02336344e5d765c27e769e99f1146" Workload="localhost-k8s-coredns--7db6d8ff4d--zt92j-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000309480), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-7db6d8ff4d-zt92j", "timestamp":"2024-12-13 02:04:19.701254949 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:04:19.946726 env[1212]: 2024-12-13 02:04:19.709 [INFO][4655] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:04:19.946726 env[1212]: 2024-12-13 02:04:19.709 [INFO][4655] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:04:19.946726 env[1212]: 2024-12-13 02:04:19.709 [INFO][4655] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 02:04:19.946726 env[1212]: 2024-12-13 02:04:19.711 [INFO][4655] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.fca302ce09017c28a3213b9d390fde5a3ac02336344e5d765c27e769e99f1146" host="localhost" Dec 13 02:04:19.946726 env[1212]: 2024-12-13 02:04:19.714 [INFO][4655] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 02:04:19.946726 env[1212]: 2024-12-13 02:04:19.718 [INFO][4655] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 02:04:19.946726 env[1212]: 2024-12-13 02:04:19.719 [INFO][4655] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 02:04:19.946726 env[1212]: 2024-12-13 02:04:19.721 [INFO][4655] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 02:04:19.946726 env[1212]: 2024-12-13 02:04:19.721 [INFO][4655] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.fca302ce09017c28a3213b9d390fde5a3ac02336344e5d765c27e769e99f1146" host="localhost" Dec 13 02:04:19.946726 env[1212]: 2024-12-13 02:04:19.722 [INFO][4655] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.fca302ce09017c28a3213b9d390fde5a3ac02336344e5d765c27e769e99f1146 Dec 13 02:04:19.946726 env[1212]: 2024-12-13 02:04:19.766 [INFO][4655] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.fca302ce09017c28a3213b9d390fde5a3ac02336344e5d765c27e769e99f1146" host="localhost" Dec 13 02:04:19.946726 env[1212]: 2024-12-13 02:04:19.875 [INFO][4655] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.fca302ce09017c28a3213b9d390fde5a3ac02336344e5d765c27e769e99f1146" host="localhost" Dec 13 02:04:19.946726 env[1212]: 2024-12-13 02:04:19.875 [INFO][4655] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.fca302ce09017c28a3213b9d390fde5a3ac02336344e5d765c27e769e99f1146" host="localhost" Dec 13 02:04:19.946726 env[1212]: 2024-12-13 02:04:19.875 [INFO][4655] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:04:19.946726 env[1212]: 2024-12-13 02:04:19.875 [INFO][4655] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="fca302ce09017c28a3213b9d390fde5a3ac02336344e5d765c27e769e99f1146" HandleID="k8s-pod-network.fca302ce09017c28a3213b9d390fde5a3ac02336344e5d765c27e769e99f1146" Workload="localhost-k8s-coredns--7db6d8ff4d--zt92j-eth0" Dec 13 02:04:19.947572 env[1212]: 2024-12-13 02:04:19.878 [INFO][4641] cni-plugin/k8s.go 386: Populated endpoint ContainerID="fca302ce09017c28a3213b9d390fde5a3ac02336344e5d765c27e769e99f1146" Namespace="kube-system" Pod="coredns-7db6d8ff4d-zt92j" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--zt92j-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--zt92j-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"096d0d62-3df0-48d4-9215-f440b6837177", ResourceVersion:"1008", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 3, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-7db6d8ff4d-zt92j", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2837a491f2a", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:04:19.947572 env[1212]: 2024-12-13 02:04:19.878 [INFO][4641] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="fca302ce09017c28a3213b9d390fde5a3ac02336344e5d765c27e769e99f1146" Namespace="kube-system" Pod="coredns-7db6d8ff4d-zt92j" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--zt92j-eth0" Dec 13 02:04:19.947572 env[1212]: 2024-12-13 02:04:19.878 [INFO][4641] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali2837a491f2a ContainerID="fca302ce09017c28a3213b9d390fde5a3ac02336344e5d765c27e769e99f1146" Namespace="kube-system" Pod="coredns-7db6d8ff4d-zt92j" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--zt92j-eth0" Dec 13 02:04:19.947572 env[1212]: 2024-12-13 02:04:19.882 [INFO][4641] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="fca302ce09017c28a3213b9d390fde5a3ac02336344e5d765c27e769e99f1146" Namespace="kube-system" Pod="coredns-7db6d8ff4d-zt92j" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--zt92j-eth0" Dec 13 02:04:19.947572 env[1212]: 2024-12-13 02:04:19.882 [INFO][4641] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="fca302ce09017c28a3213b9d390fde5a3ac02336344e5d765c27e769e99f1146" Namespace="kube-system" Pod="coredns-7db6d8ff4d-zt92j" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--zt92j-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--zt92j-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"096d0d62-3df0-48d4-9215-f440b6837177", ResourceVersion:"1008", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 3, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"fca302ce09017c28a3213b9d390fde5a3ac02336344e5d765c27e769e99f1146", Pod:"coredns-7db6d8ff4d-zt92j", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2837a491f2a", MAC:"2a:d6:01:30:0b:32", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:04:19.947572 env[1212]: 2024-12-13 02:04:19.945 [INFO][4641] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="fca302ce09017c28a3213b9d390fde5a3ac02336344e5d765c27e769e99f1146" Namespace="kube-system" Pod="coredns-7db6d8ff4d-zt92j" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--zt92j-eth0" Dec 13 02:04:19.958182 kubelet[2056]: I1213 02:04:19.958156 2056 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 02:04:19.958182 kubelet[2056]: I1213 02:04:19.958185 2056 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 02:04:19.977000 audit[4678]: NETFILTER_CFG table=filter:107 family=2 entries=50 op=nft_register_chain pid=4678 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:04:19.977000 audit[4678]: SYSCALL arch=c000003e syscall=46 success=yes exit=23900 a0=3 a1=7ffd49983e70 a2=0 a3=7ffd49983e5c items=0 ppid=3679 pid=4678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:19.977000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:04:20.034067 env[1212]: time="2024-12-13T02:04:20.033983170Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:04:20.034067 env[1212]: time="2024-12-13T02:04:20.034031203Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:04:20.034067 env[1212]: time="2024-12-13T02:04:20.034045339Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:04:20.034293 env[1212]: time="2024-12-13T02:04:20.034226578Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fca302ce09017c28a3213b9d390fde5a3ac02336344e5d765c27e769e99f1146 pid=4690 runtime=io.containerd.runc.v2 Dec 13 02:04:20.043603 systemd[1]: Started cri-containerd-fca302ce09017c28a3213b9d390fde5a3ac02336344e5d765c27e769e99f1146.scope. Dec 13 02:04:20.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.054000 audit: BPF prog-id=192 op=LOAD Dec 13 02:04:20.055000 audit[4701]: AVC avc: denied { bpf } for pid=4701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.055000 audit[4701]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4690 pid=4701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:20.055000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663613330326365303930313763323861333231336239643339306664 Dec 13 02:04:20.055000 audit[4701]: AVC avc: denied { perfmon } for pid=4701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.055000 audit[4701]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4690 pid=4701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:20.055000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663613330326365303930313763323861333231336239643339306664 Dec 13 02:04:20.055000 audit[4701]: AVC avc: denied { bpf } for pid=4701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.055000 audit[4701]: AVC avc: denied { bpf } for pid=4701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.055000 audit[4701]: AVC avc: denied { bpf } for pid=4701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.055000 audit[4701]: AVC avc: denied { perfmon } for pid=4701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.055000 audit[4701]: AVC avc: denied { perfmon } for pid=4701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.055000 audit[4701]: AVC avc: denied { perfmon } for pid=4701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.055000 audit[4701]: AVC avc: denied { perfmon } for pid=4701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.055000 audit[4701]: AVC avc: denied { perfmon } for pid=4701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.055000 audit[4701]: AVC avc: denied { bpf } for pid=4701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.055000 audit[4701]: AVC avc: denied { bpf } for pid=4701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.055000 audit: BPF prog-id=193 op=LOAD Dec 13 02:04:20.055000 audit[4701]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000323e90 items=0 ppid=4690 pid=4701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:20.055000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663613330326365303930313763323861333231336239643339306664 Dec 13 02:04:20.055000 audit[4701]: AVC avc: denied { bpf } for pid=4701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.055000 audit[4701]: AVC avc: denied { bpf } for pid=4701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.055000 audit[4701]: AVC avc: denied { perfmon } for pid=4701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.055000 audit[4701]: AVC avc: denied { perfmon } for pid=4701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.055000 audit[4701]: AVC avc: denied { perfmon } for pid=4701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.055000 audit[4701]: AVC avc: denied { perfmon } for pid=4701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.055000 audit[4701]: AVC avc: denied { perfmon } for pid=4701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.055000 audit[4701]: AVC avc: denied { bpf } for pid=4701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.055000 audit[4701]: AVC avc: denied { bpf } for pid=4701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.055000 audit: BPF prog-id=194 op=LOAD Dec 13 02:04:20.055000 audit[4701]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000323ed8 items=0 ppid=4690 pid=4701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:20.055000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663613330326365303930313763323861333231336239643339306664 Dec 13 02:04:20.055000 audit: BPF prog-id=194 op=UNLOAD Dec 13 02:04:20.055000 audit: BPF prog-id=193 op=UNLOAD Dec 13 02:04:20.055000 audit[4701]: AVC avc: denied { bpf } for pid=4701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.055000 audit[4701]: AVC avc: denied { bpf } for pid=4701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.055000 audit[4701]: AVC avc: denied { bpf } for pid=4701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.055000 audit[4701]: AVC avc: denied { perfmon } for pid=4701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.055000 audit[4701]: AVC avc: denied { perfmon } for pid=4701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.055000 audit[4701]: AVC avc: denied { perfmon } for pid=4701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.055000 audit[4701]: AVC avc: denied { perfmon } for pid=4701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.055000 audit[4701]: AVC avc: denied { perfmon } for pid=4701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.055000 audit[4701]: AVC avc: denied { bpf } for pid=4701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.055000 audit[4701]: AVC avc: denied { bpf } for pid=4701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.055000 audit: BPF prog-id=195 op=LOAD Dec 13 02:04:20.055000 audit[4701]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003882e8 items=0 ppid=4690 pid=4701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:20.055000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663613330326365303930313763323861333231336239643339306664 Dec 13 02:04:20.057076 systemd-resolved[1144]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 02:04:20.079228 env[1212]: time="2024-12-13T02:04:20.079179281Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-zt92j,Uid:096d0d62-3df0-48d4-9215-f440b6837177,Namespace:kube-system,Attempt:1,} returns sandbox id \"fca302ce09017c28a3213b9d390fde5a3ac02336344e5d765c27e769e99f1146\"" Dec 13 02:04:20.079995 kubelet[2056]: E1213 02:04:20.079973 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:04:20.082234 env[1212]: time="2024-12-13T02:04:20.082185766Z" level=info msg="CreateContainer within sandbox \"fca302ce09017c28a3213b9d390fde5a3ac02336344e5d765c27e769e99f1146\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 02:04:20.209437 kubelet[2056]: I1213 02:04:20.209344 2056 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-wlj2f" podStartSLOduration=37.083337659 podStartE2EDuration="45.209323691s" podCreationTimestamp="2024-12-13 02:03:35 +0000 UTC" firstStartedPulling="2024-12-13 02:04:11.148927966 +0000 UTC m=+58.727612970" lastFinishedPulling="2024-12-13 02:04:19.274913998 +0000 UTC m=+66.853599002" observedRunningTime="2024-12-13 02:04:20.208798029 +0000 UTC m=+67.787483033" watchObservedRunningTime="2024-12-13 02:04:20.209323691 +0000 UTC m=+67.788008695" Dec 13 02:04:20.318200 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2982790396.mount: Deactivated successfully. Dec 13 02:04:20.413924 env[1212]: time="2024-12-13T02:04:20.413847002Z" level=info msg="CreateContainer within sandbox \"fca302ce09017c28a3213b9d390fde5a3ac02336344e5d765c27e769e99f1146\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"ef3317a41d22871b7f5b6b8b15f6385171bdbdb16eb7cf64894c3768ec156569\"" Dec 13 02:04:20.414509 env[1212]: time="2024-12-13T02:04:20.414468498Z" level=info msg="StartContainer for \"ef3317a41d22871b7f5b6b8b15f6385171bdbdb16eb7cf64894c3768ec156569\"" Dec 13 02:04:20.428502 systemd[1]: Started cri-containerd-ef3317a41d22871b7f5b6b8b15f6385171bdbdb16eb7cf64894c3768ec156569.scope. Dec 13 02:04:20.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.462000 audit: BPF prog-id=196 op=LOAD Dec 13 02:04:20.464000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.464000 audit[4732]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4690 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:20.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566333331376134316432323837316237663562366238623135663633 Dec 13 02:04:20.464000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.464000 audit[4732]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4690 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:20.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566333331376134316432323837316237663562366238623135663633 Dec 13 02:04:20.464000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.464000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.464000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.464000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.464000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.464000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.464000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.464000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.464000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.464000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.464000 audit: BPF prog-id=197 op=LOAD Dec 13 02:04:20.464000 audit[4732]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000e7d60 items=0 ppid=4690 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:20.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566333331376134316432323837316237663562366238623135663633 Dec 13 02:04:20.464000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.464000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.464000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.464000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.464000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.464000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.464000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.464000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.464000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.464000 audit: BPF prog-id=198 op=LOAD Dec 13 02:04:20.464000 audit[4732]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000e7da8 items=0 ppid=4690 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:20.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566333331376134316432323837316237663562366238623135663633 Dec 13 02:04:20.464000 audit: BPF prog-id=198 op=UNLOAD Dec 13 02:04:20.464000 audit: BPF prog-id=197 op=UNLOAD Dec 13 02:04:20.464000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.464000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.464000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.464000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.464000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.464000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.464000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.464000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.464000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.464000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.464000 audit: BPF prog-id=199 op=LOAD Dec 13 02:04:20.464000 audit[4732]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003361b8 items=0 ppid=4690 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:20.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566333331376134316432323837316237663562366238623135663633 Dec 13 02:04:20.598635 env[1212]: time="2024-12-13T02:04:20.598564945Z" level=info msg="StartContainer for \"ef3317a41d22871b7f5b6b8b15f6385171bdbdb16eb7cf64894c3768ec156569\" returns successfully" Dec 13 02:04:21.037180 kubelet[2056]: E1213 02:04:21.037141 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:04:21.297000 audit[4764]: NETFILTER_CFG table=filter:108 family=2 entries=16 op=nft_register_rule pid=4764 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:04:21.297000 audit[4764]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffee38c8ac0 a2=0 a3=7ffee38c8aac items=0 ppid=2232 pid=4764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:21.297000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:04:21.303000 audit[4764]: NETFILTER_CFG table=nat:109 family=2 entries=14 op=nft_register_rule pid=4764 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:04:21.303000 audit[4764]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffee38c8ac0 a2=0 a3=0 items=0 ppid=2232 pid=4764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:21.303000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:04:21.911050 systemd-networkd[1031]: cali2837a491f2a: Gained IPv6LL Dec 13 02:04:22.038960 kubelet[2056]: E1213 02:04:22.038933 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:04:22.047350 kubelet[2056]: I1213 02:04:22.047055 2056 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-zt92j" podStartSLOduration=56.047035806 podStartE2EDuration="56.047035806s" podCreationTimestamp="2024-12-13 02:03:26 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:04:21.197057424 +0000 UTC m=+68.775742428" watchObservedRunningTime="2024-12-13 02:04:22.047035806 +0000 UTC m=+69.625720840" Dec 13 02:04:22.055000 audit[4766]: NETFILTER_CFG table=filter:110 family=2 entries=13 op=nft_register_rule pid=4766 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:04:22.055000 audit[4766]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc9dd3fdc0 a2=0 a3=7ffc9dd3fdac items=0 ppid=2232 pid=4766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:22.055000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:04:22.067000 audit[4766]: NETFILTER_CFG table=nat:111 family=2 entries=35 op=nft_register_chain pid=4766 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:04:22.067000 audit[4766]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffc9dd3fdc0 a2=0 a3=7ffc9dd3fdac items=0 ppid=2232 pid=4766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:22.067000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:04:22.508393 env[1212]: time="2024-12-13T02:04:22.508344165Z" level=info msg="StopPodSandbox for \"ef5585c89920b4677b8ae95fe230f81b58d43df20d41f8e3a620c6fc316661cb\"" Dec 13 02:04:22.584972 env[1212]: 2024-12-13 02:04:22.551 [INFO][4785] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ef5585c89920b4677b8ae95fe230f81b58d43df20d41f8e3a620c6fc316661cb" Dec 13 02:04:22.584972 env[1212]: 2024-12-13 02:04:22.551 [INFO][4785] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="ef5585c89920b4677b8ae95fe230f81b58d43df20d41f8e3a620c6fc316661cb" iface="eth0" netns="/var/run/netns/cni-15208e91-01f6-d6ab-8a8f-f869f7535dd4" Dec 13 02:04:22.584972 env[1212]: 2024-12-13 02:04:22.551 [INFO][4785] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="ef5585c89920b4677b8ae95fe230f81b58d43df20d41f8e3a620c6fc316661cb" iface="eth0" netns="/var/run/netns/cni-15208e91-01f6-d6ab-8a8f-f869f7535dd4" Dec 13 02:04:22.584972 env[1212]: 2024-12-13 02:04:22.552 [INFO][4785] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="ef5585c89920b4677b8ae95fe230f81b58d43df20d41f8e3a620c6fc316661cb" iface="eth0" netns="/var/run/netns/cni-15208e91-01f6-d6ab-8a8f-f869f7535dd4" Dec 13 02:04:22.584972 env[1212]: 2024-12-13 02:04:22.552 [INFO][4785] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ef5585c89920b4677b8ae95fe230f81b58d43df20d41f8e3a620c6fc316661cb" Dec 13 02:04:22.584972 env[1212]: 2024-12-13 02:04:22.552 [INFO][4785] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ef5585c89920b4677b8ae95fe230f81b58d43df20d41f8e3a620c6fc316661cb" Dec 13 02:04:22.584972 env[1212]: 2024-12-13 02:04:22.575 [INFO][4792] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ef5585c89920b4677b8ae95fe230f81b58d43df20d41f8e3a620c6fc316661cb" HandleID="k8s-pod-network.ef5585c89920b4677b8ae95fe230f81b58d43df20d41f8e3a620c6fc316661cb" Workload="localhost-k8s-coredns--7db6d8ff4d--7bp6j-eth0" Dec 13 02:04:22.584972 env[1212]: 2024-12-13 02:04:22.575 [INFO][4792] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:04:22.584972 env[1212]: 2024-12-13 02:04:22.575 [INFO][4792] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:04:22.584972 env[1212]: 2024-12-13 02:04:22.580 [WARNING][4792] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ef5585c89920b4677b8ae95fe230f81b58d43df20d41f8e3a620c6fc316661cb" HandleID="k8s-pod-network.ef5585c89920b4677b8ae95fe230f81b58d43df20d41f8e3a620c6fc316661cb" Workload="localhost-k8s-coredns--7db6d8ff4d--7bp6j-eth0" Dec 13 02:04:22.584972 env[1212]: 2024-12-13 02:04:22.580 [INFO][4792] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ef5585c89920b4677b8ae95fe230f81b58d43df20d41f8e3a620c6fc316661cb" HandleID="k8s-pod-network.ef5585c89920b4677b8ae95fe230f81b58d43df20d41f8e3a620c6fc316661cb" Workload="localhost-k8s-coredns--7db6d8ff4d--7bp6j-eth0" Dec 13 02:04:22.584972 env[1212]: 2024-12-13 02:04:22.581 [INFO][4792] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:04:22.584972 env[1212]: 2024-12-13 02:04:22.583 [INFO][4785] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ef5585c89920b4677b8ae95fe230f81b58d43df20d41f8e3a620c6fc316661cb" Dec 13 02:04:22.585434 env[1212]: time="2024-12-13T02:04:22.585232789Z" level=info msg="TearDown network for sandbox \"ef5585c89920b4677b8ae95fe230f81b58d43df20d41f8e3a620c6fc316661cb\" successfully" Dec 13 02:04:22.585434 env[1212]: time="2024-12-13T02:04:22.585288425Z" level=info msg="StopPodSandbox for \"ef5585c89920b4677b8ae95fe230f81b58d43df20d41f8e3a620c6fc316661cb\" returns successfully" Dec 13 02:04:22.585723 kubelet[2056]: E1213 02:04:22.585694 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:04:22.586794 env[1212]: time="2024-12-13T02:04:22.586424158Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-7bp6j,Uid:571d000a-2d6a-4a9f-ac62-6d23835462b8,Namespace:kube-system,Attempt:1,}" Dec 13 02:04:22.587770 systemd[1]: run-netns-cni\x2d15208e91\x2d01f6\x2dd6ab\x2d8a8f\x2df869f7535dd4.mount: Deactivated successfully. Dec 13 02:04:22.683685 systemd-networkd[1031]: cali536e1834f1e: Link UP Dec 13 02:04:22.685987 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:04:22.686039 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali536e1834f1e: link becomes ready Dec 13 02:04:22.686176 systemd-networkd[1031]: cali536e1834f1e: Gained carrier Dec 13 02:04:22.774205 env[1212]: 2024-12-13 02:04:22.629 [INFO][4799] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--7db6d8ff4d--7bp6j-eth0 coredns-7db6d8ff4d- kube-system 571d000a-2d6a-4a9f-ac62-6d23835462b8 1047 0 2024-12-13 02:03:26 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-7db6d8ff4d-7bp6j eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali536e1834f1e [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="6fb4e6c52c4ad62e4988f339d8b078cc7a7cbf13b92dc4d6aa57e9609f70d1f3" Namespace="kube-system" Pod="coredns-7db6d8ff4d-7bp6j" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--7bp6j-" Dec 13 02:04:22.774205 env[1212]: 2024-12-13 02:04:22.629 [INFO][4799] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="6fb4e6c52c4ad62e4988f339d8b078cc7a7cbf13b92dc4d6aa57e9609f70d1f3" Namespace="kube-system" Pod="coredns-7db6d8ff4d-7bp6j" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--7bp6j-eth0" Dec 13 02:04:22.774205 env[1212]: 2024-12-13 02:04:22.648 [INFO][4812] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6fb4e6c52c4ad62e4988f339d8b078cc7a7cbf13b92dc4d6aa57e9609f70d1f3" HandleID="k8s-pod-network.6fb4e6c52c4ad62e4988f339d8b078cc7a7cbf13b92dc4d6aa57e9609f70d1f3" Workload="localhost-k8s-coredns--7db6d8ff4d--7bp6j-eth0" Dec 13 02:04:22.774205 env[1212]: 2024-12-13 02:04:22.657 [INFO][4812] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="6fb4e6c52c4ad62e4988f339d8b078cc7a7cbf13b92dc4d6aa57e9609f70d1f3" HandleID="k8s-pod-network.6fb4e6c52c4ad62e4988f339d8b078cc7a7cbf13b92dc4d6aa57e9609f70d1f3" Workload="localhost-k8s-coredns--7db6d8ff4d--7bp6j-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027ded0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-7db6d8ff4d-7bp6j", "timestamp":"2024-12-13 02:04:22.648945715 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:04:22.774205 env[1212]: 2024-12-13 02:04:22.657 [INFO][4812] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:04:22.774205 env[1212]: 2024-12-13 02:04:22.657 [INFO][4812] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:04:22.774205 env[1212]: 2024-12-13 02:04:22.657 [INFO][4812] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 02:04:22.774205 env[1212]: 2024-12-13 02:04:22.658 [INFO][4812] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6fb4e6c52c4ad62e4988f339d8b078cc7a7cbf13b92dc4d6aa57e9609f70d1f3" host="localhost" Dec 13 02:04:22.774205 env[1212]: 2024-12-13 02:04:22.661 [INFO][4812] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 02:04:22.774205 env[1212]: 2024-12-13 02:04:22.664 [INFO][4812] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 02:04:22.774205 env[1212]: 2024-12-13 02:04:22.665 [INFO][4812] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 02:04:22.774205 env[1212]: 2024-12-13 02:04:22.668 [INFO][4812] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 02:04:22.774205 env[1212]: 2024-12-13 02:04:22.668 [INFO][4812] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.6fb4e6c52c4ad62e4988f339d8b078cc7a7cbf13b92dc4d6aa57e9609f70d1f3" host="localhost" Dec 13 02:04:22.774205 env[1212]: 2024-12-13 02:04:22.669 [INFO][4812] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.6fb4e6c52c4ad62e4988f339d8b078cc7a7cbf13b92dc4d6aa57e9609f70d1f3 Dec 13 02:04:22.774205 env[1212]: 2024-12-13 02:04:22.673 [INFO][4812] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.6fb4e6c52c4ad62e4988f339d8b078cc7a7cbf13b92dc4d6aa57e9609f70d1f3" host="localhost" Dec 13 02:04:22.774205 env[1212]: 2024-12-13 02:04:22.679 [INFO][4812] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.6fb4e6c52c4ad62e4988f339d8b078cc7a7cbf13b92dc4d6aa57e9609f70d1f3" host="localhost" Dec 13 02:04:22.774205 env[1212]: 2024-12-13 02:04:22.680 [INFO][4812] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.6fb4e6c52c4ad62e4988f339d8b078cc7a7cbf13b92dc4d6aa57e9609f70d1f3" host="localhost" Dec 13 02:04:22.774205 env[1212]: 2024-12-13 02:04:22.680 [INFO][4812] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:04:22.774205 env[1212]: 2024-12-13 02:04:22.680 [INFO][4812] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="6fb4e6c52c4ad62e4988f339d8b078cc7a7cbf13b92dc4d6aa57e9609f70d1f3" HandleID="k8s-pod-network.6fb4e6c52c4ad62e4988f339d8b078cc7a7cbf13b92dc4d6aa57e9609f70d1f3" Workload="localhost-k8s-coredns--7db6d8ff4d--7bp6j-eth0" Dec 13 02:04:22.775003 env[1212]: 2024-12-13 02:04:22.681 [INFO][4799] cni-plugin/k8s.go 386: Populated endpoint ContainerID="6fb4e6c52c4ad62e4988f339d8b078cc7a7cbf13b92dc4d6aa57e9609f70d1f3" Namespace="kube-system" Pod="coredns-7db6d8ff4d-7bp6j" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--7bp6j-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--7bp6j-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"571d000a-2d6a-4a9f-ac62-6d23835462b8", ResourceVersion:"1047", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 3, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-7db6d8ff4d-7bp6j", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali536e1834f1e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:04:22.775003 env[1212]: 2024-12-13 02:04:22.681 [INFO][4799] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.134/32] ContainerID="6fb4e6c52c4ad62e4988f339d8b078cc7a7cbf13b92dc4d6aa57e9609f70d1f3" Namespace="kube-system" Pod="coredns-7db6d8ff4d-7bp6j" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--7bp6j-eth0" Dec 13 02:04:22.775003 env[1212]: 2024-12-13 02:04:22.682 [INFO][4799] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali536e1834f1e ContainerID="6fb4e6c52c4ad62e4988f339d8b078cc7a7cbf13b92dc4d6aa57e9609f70d1f3" Namespace="kube-system" Pod="coredns-7db6d8ff4d-7bp6j" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--7bp6j-eth0" Dec 13 02:04:22.775003 env[1212]: 2024-12-13 02:04:22.686 [INFO][4799] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="6fb4e6c52c4ad62e4988f339d8b078cc7a7cbf13b92dc4d6aa57e9609f70d1f3" Namespace="kube-system" Pod="coredns-7db6d8ff4d-7bp6j" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--7bp6j-eth0" Dec 13 02:04:22.775003 env[1212]: 2024-12-13 02:04:22.686 [INFO][4799] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="6fb4e6c52c4ad62e4988f339d8b078cc7a7cbf13b92dc4d6aa57e9609f70d1f3" Namespace="kube-system" Pod="coredns-7db6d8ff4d-7bp6j" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--7bp6j-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--7bp6j-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"571d000a-2d6a-4a9f-ac62-6d23835462b8", ResourceVersion:"1047", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 3, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"6fb4e6c52c4ad62e4988f339d8b078cc7a7cbf13b92dc4d6aa57e9609f70d1f3", Pod:"coredns-7db6d8ff4d-7bp6j", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali536e1834f1e", MAC:"1e:14:d6:f9:0d:40", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:04:22.775003 env[1212]: 2024-12-13 02:04:22.770 [INFO][4799] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="6fb4e6c52c4ad62e4988f339d8b078cc7a7cbf13b92dc4d6aa57e9609f70d1f3" Namespace="kube-system" Pod="coredns-7db6d8ff4d-7bp6j" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--7bp6j-eth0" Dec 13 02:04:22.781000 audit[4833]: NETFILTER_CFG table=filter:112 family=2 entries=46 op=nft_register_chain pid=4833 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:04:22.781000 audit[4833]: SYSCALL arch=c000003e syscall=46 success=yes exit=21784 a0=3 a1=7ffe98975460 a2=0 a3=7ffe9897544c items=0 ppid=3679 pid=4833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:22.781000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:04:22.855980 env[1212]: time="2024-12-13T02:04:22.855909171Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:04:22.855980 env[1212]: time="2024-12-13T02:04:22.855950471Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:04:22.855980 env[1212]: time="2024-12-13T02:04:22.855959539Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:04:22.856190 env[1212]: time="2024-12-13T02:04:22.856094678Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6fb4e6c52c4ad62e4988f339d8b078cc7a7cbf13b92dc4d6aa57e9609f70d1f3 pid=4841 runtime=io.containerd.runc.v2 Dec 13 02:04:22.871745 systemd[1]: Started cri-containerd-6fb4e6c52c4ad62e4988f339d8b078cc7a7cbf13b92dc4d6aa57e9609f70d1f3.scope. Dec 13 02:04:22.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:22.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:22.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:22.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:22.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:22.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:22.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:22.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:22.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:22.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:22.880000 audit: BPF prog-id=200 op=LOAD Dec 13 02:04:22.880000 audit[4851]: AVC avc: denied { bpf } for pid=4851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:22.880000 audit[4851]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4841 pid=4851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:22.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666623465366335326334616436326534393838663333396438623037 Dec 13 02:04:22.880000 audit[4851]: AVC avc: denied { perfmon } for pid=4851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:22.880000 audit[4851]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=4841 pid=4851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:22.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666623465366335326334616436326534393838663333396438623037 Dec 13 02:04:22.880000 audit[4851]: AVC avc: denied { bpf } for pid=4851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:22.880000 audit[4851]: AVC avc: denied { bpf } for pid=4851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:22.880000 audit[4851]: AVC avc: denied { bpf } for pid=4851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:22.880000 audit[4851]: AVC avc: denied { perfmon } for pid=4851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:22.880000 audit[4851]: AVC avc: denied { perfmon } for pid=4851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:22.880000 audit[4851]: AVC avc: denied { perfmon } for pid=4851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:22.880000 audit[4851]: AVC avc: denied { perfmon } for pid=4851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:22.880000 audit[4851]: AVC avc: denied { perfmon } for pid=4851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:22.880000 audit[4851]: AVC avc: denied { bpf } for pid=4851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:22.880000 audit[4851]: AVC avc: denied { bpf } for pid=4851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:22.880000 audit: BPF prog-id=201 op=LOAD Dec 13 02:04:22.880000 audit[4851]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003ca1d0 items=0 ppid=4841 pid=4851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:22.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666623465366335326334616436326534393838663333396438623037 Dec 13 02:04:22.880000 audit[4851]: AVC avc: denied { bpf } for pid=4851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:22.880000 audit[4851]: AVC avc: denied { bpf } for pid=4851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:22.880000 audit[4851]: AVC avc: denied { perfmon } for pid=4851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:22.880000 audit[4851]: AVC avc: denied { perfmon } for pid=4851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:22.880000 audit[4851]: AVC avc: denied { perfmon } for pid=4851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:22.880000 audit[4851]: AVC avc: denied { perfmon } for pid=4851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:22.880000 audit[4851]: AVC avc: denied { perfmon } for pid=4851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:22.880000 audit[4851]: AVC avc: denied { bpf } for pid=4851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:22.880000 audit[4851]: AVC avc: denied { bpf } for pid=4851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:22.880000 audit: BPF prog-id=202 op=LOAD Dec 13 02:04:22.880000 audit[4851]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003ca218 items=0 ppid=4841 pid=4851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:22.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666623465366335326334616436326534393838663333396438623037 Dec 13 02:04:22.880000 audit: BPF prog-id=202 op=UNLOAD Dec 13 02:04:22.880000 audit: BPF prog-id=201 op=UNLOAD Dec 13 02:04:22.880000 audit[4851]: AVC avc: denied { bpf } for pid=4851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:22.880000 audit[4851]: AVC avc: denied { bpf } for pid=4851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:22.880000 audit[4851]: AVC avc: denied { bpf } for pid=4851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:22.880000 audit[4851]: AVC avc: denied { perfmon } for pid=4851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:22.880000 audit[4851]: AVC avc: denied { perfmon } for pid=4851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:22.880000 audit[4851]: AVC avc: denied { perfmon } for pid=4851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:22.880000 audit[4851]: AVC avc: denied { perfmon } for pid=4851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:22.880000 audit[4851]: AVC avc: denied { perfmon } for pid=4851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:22.880000 audit[4851]: AVC avc: denied { bpf } for pid=4851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:22.880000 audit[4851]: AVC avc: denied { bpf } for pid=4851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:22.880000 audit: BPF prog-id=203 op=LOAD Dec 13 02:04:22.880000 audit[4851]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003ca628 items=0 ppid=4841 pid=4851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:22.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666623465366335326334616436326534393838663333396438623037 Dec 13 02:04:22.882278 systemd-resolved[1144]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 02:04:22.903706 env[1212]: time="2024-12-13T02:04:22.903661278Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-7bp6j,Uid:571d000a-2d6a-4a9f-ac62-6d23835462b8,Namespace:kube-system,Attempt:1,} returns sandbox id \"6fb4e6c52c4ad62e4988f339d8b078cc7a7cbf13b92dc4d6aa57e9609f70d1f3\"" Dec 13 02:04:22.904614 kubelet[2056]: E1213 02:04:22.904591 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:04:22.906476 env[1212]: time="2024-12-13T02:04:22.906430349Z" level=info msg="CreateContainer within sandbox \"6fb4e6c52c4ad62e4988f339d8b078cc7a7cbf13b92dc4d6aa57e9609f70d1f3\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 02:04:23.041836 kubelet[2056]: E1213 02:04:23.041743 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:04:23.515020 env[1212]: time="2024-12-13T02:04:23.514951495Z" level=info msg="CreateContainer within sandbox \"6fb4e6c52c4ad62e4988f339d8b078cc7a7cbf13b92dc4d6aa57e9609f70d1f3\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"179deb3ceea068979f4e05294b843c7ef7643b63db978b84f5d4fc248e8fc740\"" Dec 13 02:04:23.518969 env[1212]: time="2024-12-13T02:04:23.518483387Z" level=info msg="StartContainer for \"179deb3ceea068979f4e05294b843c7ef7643b63db978b84f5d4fc248e8fc740\"" Dec 13 02:04:23.543157 systemd[1]: Started cri-containerd-179deb3ceea068979f4e05294b843c7ef7643b63db978b84f5d4fc248e8fc740.scope. Dec 13 02:04:23.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:23.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:23.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:23.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:23.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:23.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:23.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:23.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:23.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:23.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:23.560000 audit: BPF prog-id=204 op=LOAD Dec 13 02:04:23.560000 audit[4886]: AVC avc: denied { bpf } for pid=4886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:23.560000 audit[4886]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4841 pid=4886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:23.560000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137396465623363656561303638393739663465303532393462383433 Dec 13 02:04:23.561000 audit[4886]: AVC avc: denied { perfmon } for pid=4886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:23.561000 audit[4886]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4841 pid=4886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:23.561000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137396465623363656561303638393739663465303532393462383433 Dec 13 02:04:23.561000 audit[4886]: AVC avc: denied { bpf } for pid=4886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:23.561000 audit[4886]: AVC avc: denied { bpf } for pid=4886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:23.561000 audit[4886]: AVC avc: denied { bpf } for pid=4886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:23.561000 audit[4886]: AVC avc: denied { perfmon } for pid=4886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:23.561000 audit[4886]: AVC avc: denied { perfmon } for pid=4886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:23.561000 audit[4886]: AVC avc: denied { perfmon } for pid=4886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:23.561000 audit[4886]: AVC avc: denied { perfmon } for pid=4886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:23.561000 audit[4886]: AVC avc: denied { perfmon } for pid=4886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:23.561000 audit[4886]: AVC avc: denied { bpf } for pid=4886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:23.561000 audit[4886]: AVC avc: denied { bpf } for pid=4886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:23.561000 audit: BPF prog-id=205 op=LOAD Dec 13 02:04:23.561000 audit[4886]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003a6800 items=0 ppid=4841 pid=4886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:23.561000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137396465623363656561303638393739663465303532393462383433 Dec 13 02:04:23.561000 audit[4886]: AVC avc: denied { bpf } for pid=4886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:23.561000 audit[4886]: AVC avc: denied { bpf } for pid=4886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:23.561000 audit[4886]: AVC avc: denied { perfmon } for pid=4886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:23.561000 audit[4886]: AVC avc: denied { perfmon } for pid=4886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:23.561000 audit[4886]: AVC avc: denied { perfmon } for pid=4886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:23.561000 audit[4886]: AVC avc: denied { perfmon } for pid=4886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:23.561000 audit[4886]: AVC avc: denied { perfmon } for pid=4886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:23.561000 audit[4886]: AVC avc: denied { bpf } for pid=4886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:23.561000 audit[4886]: AVC avc: denied { bpf } for pid=4886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:23.561000 audit: BPF prog-id=206 op=LOAD Dec 13 02:04:23.561000 audit[4886]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003a6848 items=0 ppid=4841 pid=4886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:23.561000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137396465623363656561303638393739663465303532393462383433 Dec 13 02:04:23.561000 audit: BPF prog-id=206 op=UNLOAD Dec 13 02:04:23.561000 audit: BPF prog-id=205 op=UNLOAD Dec 13 02:04:23.561000 audit[4886]: AVC avc: denied { bpf } for pid=4886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:23.561000 audit[4886]: AVC avc: denied { bpf } for pid=4886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:23.561000 audit[4886]: AVC avc: denied { bpf } for pid=4886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:23.561000 audit[4886]: AVC avc: denied { perfmon } for pid=4886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:23.561000 audit[4886]: AVC avc: denied { perfmon } for pid=4886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:23.561000 audit[4886]: AVC avc: denied { perfmon } for pid=4886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:23.561000 audit[4886]: AVC avc: denied { perfmon } for pid=4886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:23.561000 audit[4886]: AVC avc: denied { perfmon } for pid=4886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:23.561000 audit[4886]: AVC avc: denied { bpf } for pid=4886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:23.561000 audit[4886]: AVC avc: denied { bpf } for pid=4886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:23.561000 audit: BPF prog-id=207 op=LOAD Dec 13 02:04:23.561000 audit[4886]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003a6c58 items=0 ppid=4841 pid=4886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:23.561000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137396465623363656561303638393739663465303532393462383433 Dec 13 02:04:23.593415 env[1212]: time="2024-12-13T02:04:23.593176742Z" level=info msg="StartContainer for \"179deb3ceea068979f4e05294b843c7ef7643b63db978b84f5d4fc248e8fc740\" returns successfully" Dec 13 02:04:23.767058 systemd-networkd[1031]: cali536e1834f1e: Gained IPv6LL Dec 13 02:04:24.045516 kubelet[2056]: E1213 02:04:24.045299 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:04:24.045516 kubelet[2056]: E1213 02:04:24.045311 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:04:24.059258 kubelet[2056]: I1213 02:04:24.059186 2056 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-7bp6j" podStartSLOduration=58.059165036 podStartE2EDuration="58.059165036s" podCreationTimestamp="2024-12-13 02:03:26 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:04:24.058209281 +0000 UTC m=+71.636894286" watchObservedRunningTime="2024-12-13 02:04:24.059165036 +0000 UTC m=+71.637850060" Dec 13 02:04:24.067000 audit[4920]: NETFILTER_CFG table=filter:113 family=2 entries=10 op=nft_register_rule pid=4920 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:04:24.067000 audit[4920]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fffe10ccd90 a2=0 a3=7fffe10ccd7c items=0 ppid=2232 pid=4920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:24.067000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:04:24.073000 audit[4920]: NETFILTER_CFG table=nat:114 family=2 entries=44 op=nft_register_rule pid=4920 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:04:24.073000 audit[4920]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7fffe10ccd90 a2=0 a3=7fffe10ccd7c items=0 ppid=2232 pid=4920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:24.073000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:04:24.341979 systemd[1]: Started sshd@17-10.0.0.89:22-10.0.0.1:59110.service. Dec 13 02:04:24.341000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.89:22-10.0.0.1:59110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:24.343695 kernel: kauditd_printk_skb: 296 callbacks suppressed Dec 13 02:04:24.343740 kernel: audit: type=1130 audit(1734055464.341:1428): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.89:22-10.0.0.1:59110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:24.384000 audit[4922]: USER_ACCT pid=4922 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:24.385922 sshd[4922]: Accepted publickey for core from 10.0.0.1 port 59110 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:04:24.388217 sshd[4922]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:04:24.386000 audit[4922]: CRED_ACQ pid=4922 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:24.392856 systemd-logind[1199]: New session 18 of user core. Dec 13 02:04:24.394631 kernel: audit: type=1101 audit(1734055464.384:1429): pid=4922 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:24.394807 kernel: audit: type=1103 audit(1734055464.386:1430): pid=4922 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:24.394827 kernel: audit: type=1006 audit(1734055464.386:1431): pid=4922 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Dec 13 02:04:24.394099 systemd[1]: Started session-18.scope. Dec 13 02:04:24.386000 audit[4922]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce7d308b0 a2=3 a3=0 items=0 ppid=1 pid=4922 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:24.402080 kernel: audit: type=1300 audit(1734055464.386:1431): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce7d308b0 a2=3 a3=0 items=0 ppid=1 pid=4922 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:24.402159 kernel: audit: type=1327 audit(1734055464.386:1431): proctitle=737368643A20636F7265205B707269765D Dec 13 02:04:24.386000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:04:24.399000 audit[4922]: USER_START pid=4922 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:24.407735 kernel: audit: type=1105 audit(1734055464.399:1432): pid=4922 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:24.407787 kernel: audit: type=1103 audit(1734055464.400:1433): pid=4924 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:24.400000 audit[4924]: CRED_ACQ pid=4924 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:24.632934 sshd[4922]: pam_unix(sshd:session): session closed for user core Dec 13 02:04:24.645000 audit[4922]: USER_END pid=4922 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:24.650693 systemd[1]: Started sshd@18-10.0.0.89:22-10.0.0.1:59118.service. Dec 13 02:04:24.651416 systemd[1]: sshd@17-10.0.0.89:22-10.0.0.1:59110.service: Deactivated successfully. Dec 13 02:04:24.652424 systemd[1]: session-18.scope: Deactivated successfully. Dec 13 02:04:24.645000 audit[4922]: CRED_DISP pid=4922 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:24.654584 systemd-logind[1199]: Session 18 logged out. Waiting for processes to exit. Dec 13 02:04:24.658276 kernel: audit: type=1106 audit(1734055464.645:1434): pid=4922 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:24.658357 kernel: audit: type=1104 audit(1734055464.645:1435): pid=4922 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:24.649000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.89:22-10.0.0.1:59118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:24.650000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.89:22-10.0.0.1:59110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:24.660383 systemd-logind[1199]: Removed session 18. Dec 13 02:04:24.703000 audit[4955]: USER_ACCT pid=4955 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:24.705091 sshd[4955]: Accepted publickey for core from 10.0.0.1 port 59118 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:04:24.705000 audit[4955]: CRED_ACQ pid=4955 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:24.705000 audit[4955]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc020e7090 a2=3 a3=0 items=0 ppid=1 pid=4955 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:24.705000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:04:24.706719 sshd[4955]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:04:24.713841 systemd-logind[1199]: New session 19 of user core. Dec 13 02:04:24.714858 systemd[1]: Started session-19.scope. Dec 13 02:04:24.723000 audit[4955]: USER_START pid=4955 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:24.728000 audit[4958]: CRED_ACQ pid=4958 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:24.784000 audit[4961]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=4961 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:04:24.784000 audit[4961]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffecc1135d0 a2=0 a3=7ffecc1135bc items=0 ppid=2232 pid=4961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:24.784000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:04:24.825000 audit[4961]: NETFILTER_CFG table=nat:116 family=2 entries=56 op=nft_register_chain pid=4961 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:04:24.825000 audit[4961]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffecc1135d0 a2=0 a3=7ffecc1135bc items=0 ppid=2232 pid=4961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:24.825000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:04:25.055438 kubelet[2056]: E1213 02:04:25.055310 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:04:25.491633 sshd[4955]: pam_unix(sshd:session): session closed for user core Dec 13 02:04:25.491000 audit[4955]: USER_END pid=4955 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:25.492000 audit[4955]: CRED_DISP pid=4955 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:25.495000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.89:22-10.0.0.1:59118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:25.496264 systemd[1]: sshd@18-10.0.0.89:22-10.0.0.1:59118.service: Deactivated successfully. Dec 13 02:04:25.497159 systemd[1]: session-19.scope: Deactivated successfully. Dec 13 02:04:25.498823 systemd-logind[1199]: Session 19 logged out. Waiting for processes to exit. Dec 13 02:04:25.501096 systemd[1]: Started sshd@19-10.0.0.89:22-10.0.0.1:59132.service. Dec 13 02:04:25.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.89:22-10.0.0.1:59132 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:25.502240 systemd-logind[1199]: Removed session 19. Dec 13 02:04:25.550000 audit[4970]: USER_ACCT pid=4970 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:25.551743 sshd[4970]: Accepted publickey for core from 10.0.0.1 port 59132 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:04:25.551000 audit[4970]: CRED_ACQ pid=4970 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:25.552000 audit[4970]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe5ecf7500 a2=3 a3=0 items=0 ppid=1 pid=4970 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:25.552000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:04:25.553362 sshd[4970]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:04:25.558256 systemd-logind[1199]: New session 20 of user core. Dec 13 02:04:25.559375 systemd[1]: Started session-20.scope. Dec 13 02:04:25.566000 audit[4970]: USER_START pid=4970 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:25.567000 audit[4972]: CRED_ACQ pid=4972 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:26.056918 kubelet[2056]: E1213 02:04:26.056868 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:04:27.078000 audit[4984]: NETFILTER_CFG table=filter:117 family=2 entries=22 op=nft_register_rule pid=4984 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:04:27.078000 audit[4984]: SYSCALL arch=c000003e syscall=46 success=yes exit=12604 a0=3 a1=7fffe3535630 a2=0 a3=7fffe353561c items=0 ppid=2232 pid=4984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:27.078000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:04:27.085000 audit[4984]: NETFILTER_CFG table=nat:118 family=2 entries=20 op=nft_register_rule pid=4984 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:04:27.085000 audit[4984]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fffe3535630 a2=0 a3=0 items=0 ppid=2232 pid=4984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:27.085000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:04:27.092831 sshd[4970]: pam_unix(sshd:session): session closed for user core Dec 13 02:04:27.092000 audit[4970]: USER_END pid=4970 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:27.092000 audit[4970]: CRED_DISP pid=4970 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:27.096543 systemd[1]: Started sshd@20-10.0.0.89:22-10.0.0.1:60168.service. Dec 13 02:04:27.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.89:22-10.0.0.1:60168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:27.097036 systemd[1]: sshd@19-10.0.0.89:22-10.0.0.1:59132.service: Deactivated successfully. Dec 13 02:04:27.096000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.89:22-10.0.0.1:59132 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:27.097801 systemd[1]: session-20.scope: Deactivated successfully. Dec 13 02:04:27.098290 systemd-logind[1199]: Session 20 logged out. Waiting for processes to exit. Dec 13 02:04:27.099286 systemd-logind[1199]: Removed session 20. Dec 13 02:04:27.099000 audit[4989]: NETFILTER_CFG table=filter:119 family=2 entries=34 op=nft_register_rule pid=4989 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:04:27.099000 audit[4989]: SYSCALL arch=c000003e syscall=46 success=yes exit=12604 a0=3 a1=7ffeac33b9b0 a2=0 a3=7ffeac33b99c items=0 ppid=2232 pid=4989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:27.099000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:04:27.105000 audit[4989]: NETFILTER_CFG table=nat:120 family=2 entries=20 op=nft_register_rule pid=4989 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:04:27.105000 audit[4989]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffeac33b9b0 a2=0 a3=0 items=0 ppid=2232 pid=4989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:27.105000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:04:27.137698 sshd[4987]: Accepted publickey for core from 10.0.0.1 port 60168 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:04:27.136000 audit[4987]: USER_ACCT pid=4987 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:27.139364 sshd[4987]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:04:27.138000 audit[4987]: CRED_ACQ pid=4987 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:27.138000 audit[4987]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcee5bdca0 a2=3 a3=0 items=0 ppid=1 pid=4987 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:27.138000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:04:27.144689 systemd[1]: Started session-21.scope. Dec 13 02:04:27.145128 systemd-logind[1199]: New session 21 of user core. Dec 13 02:04:27.149000 audit[4987]: USER_START pid=4987 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:27.151000 audit[4991]: CRED_ACQ pid=4991 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:27.349253 sshd[4987]: pam_unix(sshd:session): session closed for user core Dec 13 02:04:27.353535 systemd[1]: Started sshd@21-10.0.0.89:22-10.0.0.1:60172.service. Dec 13 02:04:27.352000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.89:22-10.0.0.1:60172 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:27.355000 audit[4987]: USER_END pid=4987 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:27.355000 audit[4987]: CRED_DISP pid=4987 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:27.357462 systemd[1]: sshd@20-10.0.0.89:22-10.0.0.1:60168.service: Deactivated successfully. Dec 13 02:04:27.356000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.89:22-10.0.0.1:60168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:27.358264 systemd[1]: session-21.scope: Deactivated successfully. Dec 13 02:04:27.358802 systemd-logind[1199]: Session 21 logged out. Waiting for processes to exit. Dec 13 02:04:27.359699 systemd-logind[1199]: Removed session 21. Dec 13 02:04:27.391000 audit[5001]: USER_ACCT pid=5001 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:27.392266 sshd[5001]: Accepted publickey for core from 10.0.0.1 port 60172 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:04:27.392000 audit[5001]: CRED_ACQ pid=5001 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:27.392000 audit[5001]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffaa0e5d40 a2=3 a3=0 items=0 ppid=1 pid=5001 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:27.392000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:04:27.393294 sshd[5001]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:04:27.396736 systemd-logind[1199]: New session 22 of user core. Dec 13 02:04:27.397572 systemd[1]: Started session-22.scope. Dec 13 02:04:27.401000 audit[5001]: USER_START pid=5001 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:27.402000 audit[5004]: CRED_ACQ pid=5004 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:27.512057 sshd[5001]: pam_unix(sshd:session): session closed for user core Dec 13 02:04:27.512000 audit[5001]: USER_END pid=5001 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:27.512000 audit[5001]: CRED_DISP pid=5001 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:27.514485 systemd[1]: sshd@21-10.0.0.89:22-10.0.0.1:60172.service: Deactivated successfully. Dec 13 02:04:27.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.89:22-10.0.0.1:60172 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:27.515316 systemd[1]: session-22.scope: Deactivated successfully. Dec 13 02:04:27.515869 systemd-logind[1199]: Session 22 logged out. Waiting for processes to exit. Dec 13 02:04:27.516781 systemd-logind[1199]: Removed session 22. Dec 13 02:04:32.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.89:22-10.0.0.1:60182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:32.518587 systemd[1]: Started sshd@22-10.0.0.89:22-10.0.0.1:60182.service. Dec 13 02:04:32.519812 kernel: kauditd_printk_skb: 63 callbacks suppressed Dec 13 02:04:32.519961 kernel: audit: type=1130 audit(1734055472.517:1479): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.89:22-10.0.0.1:60182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:32.567139 sshd[5023]: Accepted publickey for core from 10.0.0.1 port 60182 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:04:32.565000 audit[5023]: USER_ACCT pid=5023 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:32.569496 sshd[5023]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:04:32.568000 audit[5023]: CRED_ACQ pid=5023 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:32.577655 kernel: audit: type=1101 audit(1734055472.565:1480): pid=5023 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:32.577740 kernel: audit: type=1103 audit(1734055472.568:1481): pid=5023 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:32.577919 kernel: audit: type=1006 audit(1734055472.568:1482): pid=5023 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Dec 13 02:04:32.568000 audit[5023]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc6f91bba0 a2=3 a3=0 items=0 ppid=1 pid=5023 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:32.585714 kernel: audit: type=1300 audit(1734055472.568:1482): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc6f91bba0 a2=3 a3=0 items=0 ppid=1 pid=5023 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:32.585878 kernel: audit: type=1327 audit(1734055472.568:1482): proctitle=737368643A20636F7265205B707269765D Dec 13 02:04:32.568000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:04:32.585570 systemd-logind[1199]: New session 23 of user core. Dec 13 02:04:32.586038 systemd[1]: Started session-23.scope. Dec 13 02:04:32.597000 audit[5023]: USER_START pid=5023 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:32.597000 audit[5025]: CRED_ACQ pid=5025 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:32.608574 kernel: audit: type=1105 audit(1734055472.597:1483): pid=5023 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:32.608688 kernel: audit: type=1103 audit(1734055472.597:1484): pid=5025 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:32.715511 sshd[5023]: pam_unix(sshd:session): session closed for user core Dec 13 02:04:32.716000 audit[5023]: USER_END pid=5023 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:32.719327 systemd[1]: sshd@22-10.0.0.89:22-10.0.0.1:60182.service: Deactivated successfully. Dec 13 02:04:32.720375 systemd[1]: session-23.scope: Deactivated successfully. Dec 13 02:04:32.721610 systemd-logind[1199]: Session 23 logged out. Waiting for processes to exit. Dec 13 02:04:32.722526 systemd-logind[1199]: Removed session 23. Dec 13 02:04:32.722937 kernel: audit: type=1106 audit(1734055472.716:1485): pid=5023 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:32.716000 audit[5023]: CRED_DISP pid=5023 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:32.718000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.89:22-10.0.0.1:60182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:32.727036 kernel: audit: type=1104 audit(1734055472.716:1486): pid=5023 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:34.449000 audit[5040]: NETFILTER_CFG table=filter:121 family=2 entries=22 op=nft_register_rule pid=5040 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:04:34.449000 audit[5040]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffec3641a40 a2=0 a3=7ffec3641a2c items=0 ppid=2232 pid=5040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:34.449000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:04:34.455000 audit[5040]: NETFILTER_CFG table=nat:122 family=2 entries=104 op=nft_register_chain pid=5040 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:04:34.455000 audit[5040]: SYSCALL arch=c000003e syscall=46 success=yes exit=48684 a0=3 a1=7ffec3641a40 a2=0 a3=7ffec3641a2c items=0 ppid=2232 pid=5040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:34.455000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:04:37.504986 kubelet[2056]: E1213 02:04:37.504937 2056 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:04:37.543719 kubelet[2056]: I1213 02:04:37.543684 2056 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 02:04:37.576000 audit[5043]: NETFILTER_CFG table=filter:123 family=2 entries=9 op=nft_register_rule pid=5043 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:04:37.578288 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 02:04:37.578435 kernel: audit: type=1325 audit(1734055477.576:1490): table=filter:123 family=2 entries=9 op=nft_register_rule pid=5043 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:04:37.576000 audit[5043]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffdaa7edf20 a2=0 a3=7ffdaa7edf0c items=0 ppid=2232 pid=5043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:37.585408 kernel: audit: type=1300 audit(1734055477.576:1490): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffdaa7edf20 a2=0 a3=7ffdaa7edf0c items=0 ppid=2232 pid=5043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:37.585465 kernel: audit: type=1327 audit(1734055477.576:1490): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:04:37.576000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:04:37.589000 audit[5043]: NETFILTER_CFG table=nat:124 family=2 entries=51 op=nft_register_chain pid=5043 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:04:37.589000 audit[5043]: SYSCALL arch=c000003e syscall=46 success=yes exit=18564 a0=3 a1=7ffdaa7edf20 a2=0 a3=7ffdaa7edf0c items=0 ppid=2232 pid=5043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:37.598091 kernel: audit: type=1325 audit(1734055477.589:1491): table=nat:124 family=2 entries=51 op=nft_register_chain pid=5043 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:04:37.598212 kernel: audit: type=1300 audit(1734055477.589:1491): arch=c000003e syscall=46 success=yes exit=18564 a0=3 a1=7ffdaa7edf20 a2=0 a3=7ffdaa7edf0c items=0 ppid=2232 pid=5043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:37.598238 kernel: audit: type=1327 audit(1734055477.589:1491): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:04:37.589000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:04:37.719795 systemd[1]: Started sshd@23-10.0.0.89:22-10.0.0.1:51980.service. Dec 13 02:04:37.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.89:22-10.0.0.1:51980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:37.724908 kernel: audit: type=1130 audit(1734055477.719:1492): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.89:22-10.0.0.1:51980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:37.759000 audit[5045]: USER_ACCT pid=5045 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:37.765310 sshd[5045]: Accepted publickey for core from 10.0.0.1 port 51980 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:04:37.765919 kernel: audit: type=1101 audit(1734055477.759:1493): pid=5045 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:37.767066 sshd[5045]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:04:37.765000 audit[5045]: CRED_ACQ pid=5045 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:37.774298 kernel: audit: type=1103 audit(1734055477.765:1494): pid=5045 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:37.774435 kernel: audit: type=1006 audit(1734055477.765:1495): pid=5045 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Dec 13 02:04:37.765000 audit[5045]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1ea43c20 a2=3 a3=0 items=0 ppid=1 pid=5045 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:37.765000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:04:37.778590 systemd-logind[1199]: New session 24 of user core. Dec 13 02:04:37.778860 systemd[1]: Started session-24.scope. Dec 13 02:04:37.782000 audit[5045]: USER_START pid=5045 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:37.784000 audit[5047]: CRED_ACQ pid=5047 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:37.928590 sshd[5045]: pam_unix(sshd:session): session closed for user core Dec 13 02:04:37.928000 audit[5045]: USER_END pid=5045 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:37.928000 audit[5045]: CRED_DISP pid=5045 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:37.931676 systemd[1]: sshd@23-10.0.0.89:22-10.0.0.1:51980.service: Deactivated successfully. Dec 13 02:04:37.932647 systemd[1]: session-24.scope: Deactivated successfully. Dec 13 02:04:37.931000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.89:22-10.0.0.1:51980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:37.933309 systemd-logind[1199]: Session 24 logged out. Waiting for processes to exit. Dec 13 02:04:37.934218 systemd-logind[1199]: Removed session 24. Dec 13 02:04:42.932359 systemd[1]: Started sshd@24-10.0.0.89:22-10.0.0.1:51990.service. Dec 13 02:04:42.931000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.89:22-10.0.0.1:51990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:42.933380 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 02:04:42.933445 kernel: audit: type=1130 audit(1734055482.931:1501): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.89:22-10.0.0.1:51990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:42.971000 audit[5061]: USER_ACCT pid=5061 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:42.972641 sshd[5061]: Accepted publickey for core from 10.0.0.1 port 51990 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:04:42.975000 audit[5061]: CRED_ACQ pid=5061 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:42.977032 sshd[5061]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:04:42.980377 kernel: audit: type=1101 audit(1734055482.971:1502): pid=5061 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:42.980422 kernel: audit: type=1103 audit(1734055482.975:1503): pid=5061 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:42.980440 kernel: audit: type=1006 audit(1734055482.975:1504): pid=5061 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Dec 13 02:04:42.981270 systemd[1]: Started session-25.scope. Dec 13 02:04:42.981554 systemd-logind[1199]: New session 25 of user core. Dec 13 02:04:42.982633 kernel: audit: type=1300 audit(1734055482.975:1504): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe5b0fb500 a2=3 a3=0 items=0 ppid=1 pid=5061 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:42.975000 audit[5061]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe5b0fb500 a2=3 a3=0 items=0 ppid=1 pid=5061 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:42.989226 kernel: audit: type=1327 audit(1734055482.975:1504): proctitle=737368643A20636F7265205B707269765D Dec 13 02:04:42.975000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:04:42.984000 audit[5061]: USER_START pid=5061 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:42.995210 kernel: audit: type=1105 audit(1734055482.984:1505): pid=5061 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:42.995323 kernel: audit: type=1103 audit(1734055482.986:1506): pid=5063 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:42.986000 audit[5063]: CRED_ACQ pid=5063 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:43.098119 sshd[5061]: pam_unix(sshd:session): session closed for user core Dec 13 02:04:43.098000 audit[5061]: USER_END pid=5061 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:43.100926 systemd[1]: sshd@24-10.0.0.89:22-10.0.0.1:51990.service: Deactivated successfully. Dec 13 02:04:43.101941 systemd[1]: session-25.scope: Deactivated successfully. Dec 13 02:04:43.103521 systemd-logind[1199]: Session 25 logged out. Waiting for processes to exit. Dec 13 02:04:43.098000 audit[5061]: CRED_DISP pid=5061 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:43.104273 systemd-logind[1199]: Removed session 25. Dec 13 02:04:43.107602 kernel: audit: type=1106 audit(1734055483.098:1507): pid=5061 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:43.107654 kernel: audit: type=1104 audit(1734055483.098:1508): pid=5061 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:43.100000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.89:22-10.0.0.1:51990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:48.103189 systemd[1]: Started sshd@25-10.0.0.89:22-10.0.0.1:59976.service. Dec 13 02:04:48.102000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.89:22-10.0.0.1:59976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:48.107446 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 02:04:48.107510 kernel: audit: type=1130 audit(1734055488.102:1510): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.89:22-10.0.0.1:59976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:48.148000 audit[5098]: USER_ACCT pid=5098 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:48.149987 sshd[5098]: Accepted publickey for core from 10.0.0.1 port 59976 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:04:48.152495 sshd[5098]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:04:48.151000 audit[5098]: CRED_ACQ pid=5098 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:48.157495 systemd-logind[1199]: New session 26 of user core. Dec 13 02:04:48.158585 kernel: audit: type=1101 audit(1734055488.148:1511): pid=5098 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:48.158633 kernel: audit: type=1103 audit(1734055488.151:1512): pid=5098 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:48.158110 systemd[1]: Started session-26.scope. Dec 13 02:04:48.161163 kernel: audit: type=1006 audit(1734055488.151:1513): pid=5098 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Dec 13 02:04:48.161216 kernel: audit: type=1300 audit(1734055488.151:1513): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe7d7acf00 a2=3 a3=0 items=0 ppid=1 pid=5098 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:48.151000 audit[5098]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe7d7acf00 a2=3 a3=0 items=0 ppid=1 pid=5098 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:48.151000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:04:48.167294 kernel: audit: type=1327 audit(1734055488.151:1513): proctitle=737368643A20636F7265205B707269765D Dec 13 02:04:48.167357 kernel: audit: type=1105 audit(1734055488.162:1514): pid=5098 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:48.162000 audit[5098]: USER_START pid=5098 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:48.163000 audit[5100]: CRED_ACQ pid=5100 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:48.193641 kernel: audit: type=1103 audit(1734055488.163:1515): pid=5100 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:48.255608 kubelet[2056]: I1213 02:04:48.255260 2056 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 02:04:48.427326 sshd[5098]: pam_unix(sshd:session): session closed for user core Dec 13 02:04:48.427000 audit[5098]: USER_END pid=5098 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:48.429381 systemd[1]: sshd@25-10.0.0.89:22-10.0.0.1:59976.service: Deactivated successfully. Dec 13 02:04:48.430544 systemd[1]: session-26.scope: Deactivated successfully. Dec 13 02:04:48.431228 systemd-logind[1199]: Session 26 logged out. Waiting for processes to exit. Dec 13 02:04:48.432239 systemd-logind[1199]: Removed session 26. Dec 13 02:04:48.427000 audit[5098]: CRED_DISP pid=5098 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:48.437586 kernel: audit: type=1106 audit(1734055488.427:1516): pid=5098 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:48.437639 kernel: audit: type=1104 audit(1734055488.427:1517): pid=5098 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:48.427000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.89:22-10.0.0.1:59976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:48.438000 audit[5111]: NETFILTER_CFG table=filter:125 family=2 entries=8 op=nft_register_rule pid=5111 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:04:48.438000 audit[5111]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd74aae3e0 a2=0 a3=7ffd74aae3cc items=0 ppid=2232 pid=5111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:48.438000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:04:48.444000 audit[5111]: NETFILTER_CFG table=nat:126 family=2 entries=58 op=nft_register_chain pid=5111 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:04:48.444000 audit[5111]: SYSCALL arch=c000003e syscall=46 success=yes exit=20452 a0=3 a1=7ffd74aae3e0 a2=0 a3=7ffd74aae3cc items=0 ppid=2232 pid=5111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:48.444000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273