Dec 13 02:03:03.170868 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Dec 12 23:50:37 -00 2024 Dec 13 02:03:03.170904 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 02:03:03.170914 kernel: BIOS-provided physical RAM map: Dec 13 02:03:03.170921 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Dec 13 02:03:03.170927 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Dec 13 02:03:03.170934 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Dec 13 02:03:03.170944 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000009cfdbfff] usable Dec 13 02:03:03.170961 kernel: BIOS-e820: [mem 0x000000009cfdc000-0x000000009cffffff] reserved Dec 13 02:03:03.170970 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Dec 13 02:03:03.170978 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved Dec 13 02:03:03.170985 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Dec 13 02:03:03.170991 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Dec 13 02:03:03.170998 kernel: BIOS-e820: [mem 0x000000fd00000000-0x000000ffffffffff] reserved Dec 13 02:03:03.171005 kernel: NX (Execute Disable) protection: active Dec 13 02:03:03.171016 kernel: SMBIOS 2.8 present. Dec 13 02:03:03.171024 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 Dec 13 02:03:03.171032 kernel: Hypervisor detected: KVM Dec 13 02:03:03.171039 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 13 02:03:03.171046 kernel: kvm-clock: cpu 0, msr 5919b001, primary cpu clock Dec 13 02:03:03.171054 kernel: kvm-clock: using sched offset of 3423349352 cycles Dec 13 02:03:03.171062 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 13 02:03:03.171074 kernel: tsc: Detected 2794.748 MHz processor Dec 13 02:03:03.171082 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 02:03:03.171093 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 02:03:03.171101 kernel: last_pfn = 0x9cfdc max_arch_pfn = 0x400000000 Dec 13 02:03:03.171109 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 02:03:03.171117 kernel: Using GB pages for direct mapping Dec 13 02:03:03.171125 kernel: ACPI: Early table checksum verification disabled Dec 13 02:03:03.171133 kernel: ACPI: RSDP 0x00000000000F59D0 000014 (v00 BOCHS ) Dec 13 02:03:03.171141 kernel: ACPI: RSDT 0x000000009CFE2408 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 02:03:03.171148 kernel: ACPI: FACP 0x000000009CFE21E8 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 02:03:03.171156 kernel: ACPI: DSDT 0x000000009CFE0040 0021A8 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 02:03:03.171166 kernel: ACPI: FACS 0x000000009CFE0000 000040 Dec 13 02:03:03.171174 kernel: ACPI: APIC 0x000000009CFE22DC 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 02:03:03.171182 kernel: ACPI: HPET 0x000000009CFE236C 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 02:03:03.171206 kernel: ACPI: MCFG 0x000000009CFE23A4 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 02:03:03.171215 kernel: ACPI: WAET 0x000000009CFE23E0 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 02:03:03.171224 kernel: ACPI: Reserving FACP table memory at [mem 0x9cfe21e8-0x9cfe22db] Dec 13 02:03:03.171233 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cfe0040-0x9cfe21e7] Dec 13 02:03:03.171242 kernel: ACPI: Reserving FACS table memory at [mem 0x9cfe0000-0x9cfe003f] Dec 13 02:03:03.171256 kernel: ACPI: Reserving APIC table memory at [mem 0x9cfe22dc-0x9cfe236b] Dec 13 02:03:03.171264 kernel: ACPI: Reserving HPET table memory at [mem 0x9cfe236c-0x9cfe23a3] Dec 13 02:03:03.171274 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cfe23a4-0x9cfe23df] Dec 13 02:03:03.171284 kernel: ACPI: Reserving WAET table memory at [mem 0x9cfe23e0-0x9cfe2407] Dec 13 02:03:03.171293 kernel: No NUMA configuration found Dec 13 02:03:03.171303 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cfdbfff] Dec 13 02:03:03.171314 kernel: NODE_DATA(0) allocated [mem 0x9cfd6000-0x9cfdbfff] Dec 13 02:03:03.171324 kernel: Zone ranges: Dec 13 02:03:03.171333 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 02:03:03.171343 kernel: DMA32 [mem 0x0000000001000000-0x000000009cfdbfff] Dec 13 02:03:03.171352 kernel: Normal empty Dec 13 02:03:03.171362 kernel: Movable zone start for each node Dec 13 02:03:03.171371 kernel: Early memory node ranges Dec 13 02:03:03.171380 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Dec 13 02:03:03.171388 kernel: node 0: [mem 0x0000000000100000-0x000000009cfdbfff] Dec 13 02:03:03.171398 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cfdbfff] Dec 13 02:03:03.171411 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 02:03:03.171420 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Dec 13 02:03:03.171428 kernel: On node 0, zone DMA32: 12324 pages in unavailable ranges Dec 13 02:03:03.171437 kernel: ACPI: PM-Timer IO Port: 0x608 Dec 13 02:03:03.171445 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 13 02:03:03.171454 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Dec 13 02:03:03.171462 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Dec 13 02:03:03.171470 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 13 02:03:03.171479 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 02:03:03.171490 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 13 02:03:03.171499 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 13 02:03:03.171508 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 02:03:03.171520 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Dec 13 02:03:03.171529 kernel: TSC deadline timer available Dec 13 02:03:03.171538 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Dec 13 02:03:03.171552 kernel: kvm-guest: KVM setup pv remote TLB flush Dec 13 02:03:03.171561 kernel: kvm-guest: setup PV sched yield Dec 13 02:03:03.171573 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices Dec 13 02:03:03.171588 kernel: Booting paravirtualized kernel on KVM Dec 13 02:03:03.171596 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 02:03:03.171605 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Dec 13 02:03:03.171613 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 Dec 13 02:03:03.171621 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 Dec 13 02:03:03.171629 kernel: pcpu-alloc: [0] 0 1 2 3 Dec 13 02:03:03.171637 kernel: kvm-guest: setup async PF for cpu 0 Dec 13 02:03:03.171645 kernel: kvm-guest: stealtime: cpu 0, msr 9a41c0c0 Dec 13 02:03:03.171653 kernel: kvm-guest: PV spinlocks enabled Dec 13 02:03:03.171663 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Dec 13 02:03:03.171671 kernel: Built 1 zonelists, mobility grouping on. Total pages: 632732 Dec 13 02:03:03.171680 kernel: Policy zone: DMA32 Dec 13 02:03:03.171690 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 02:03:03.171699 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 02:03:03.171708 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Dec 13 02:03:03.171716 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 02:03:03.171725 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 02:03:03.171736 kernel: Memory: 2436696K/2571752K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47476K init, 4108K bss, 134796K reserved, 0K cma-reserved) Dec 13 02:03:03.171745 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Dec 13 02:03:03.171754 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 02:03:03.171761 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 02:03:03.171769 kernel: rcu: Hierarchical RCU implementation. Dec 13 02:03:03.171778 kernel: rcu: RCU event tracing is enabled. Dec 13 02:03:03.171787 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Dec 13 02:03:03.171795 kernel: Rude variant of Tasks RCU enabled. Dec 13 02:03:03.171803 kernel: Tracing variant of Tasks RCU enabled. Dec 13 02:03:03.171814 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 02:03:03.171823 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Dec 13 02:03:03.171831 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Dec 13 02:03:03.171840 kernel: random: crng init done Dec 13 02:03:03.171848 kernel: Console: colour VGA+ 80x25 Dec 13 02:03:03.171856 kernel: printk: console [ttyS0] enabled Dec 13 02:03:03.171865 kernel: ACPI: Core revision 20210730 Dec 13 02:03:03.171874 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Dec 13 02:03:03.171883 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 02:03:03.171894 kernel: x2apic enabled Dec 13 02:03:03.171903 kernel: Switched APIC routing to physical x2apic. Dec 13 02:03:03.171911 kernel: kvm-guest: setup PV IPIs Dec 13 02:03:03.171920 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Dec 13 02:03:03.171929 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Dec 13 02:03:03.171945 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) Dec 13 02:03:03.172060 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Dec 13 02:03:03.172074 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Dec 13 02:03:03.172085 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Dec 13 02:03:03.172103 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 02:03:03.172111 kernel: Spectre V2 : Mitigation: Retpolines Dec 13 02:03:03.172120 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 02:03:03.172131 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 02:03:03.172141 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Dec 13 02:03:03.172150 kernel: RETBleed: Mitigation: untrained return thunk Dec 13 02:03:03.172160 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 13 02:03:03.172169 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 13 02:03:03.172201 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 02:03:03.172220 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 02:03:03.172229 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 02:03:03.172238 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 02:03:03.172247 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Dec 13 02:03:03.172256 kernel: Freeing SMP alternatives memory: 32K Dec 13 02:03:03.172265 kernel: pid_max: default: 32768 minimum: 301 Dec 13 02:03:03.172273 kernel: LSM: Security Framework initializing Dec 13 02:03:03.172284 kernel: SELinux: Initializing. Dec 13 02:03:03.172293 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 02:03:03.172301 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 02:03:03.172311 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) Dec 13 02:03:03.172320 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Dec 13 02:03:03.172329 kernel: ... version: 0 Dec 13 02:03:03.172337 kernel: ... bit width: 48 Dec 13 02:03:03.172347 kernel: ... generic registers: 6 Dec 13 02:03:03.172355 kernel: ... value mask: 0000ffffffffffff Dec 13 02:03:03.172367 kernel: ... max period: 00007fffffffffff Dec 13 02:03:03.172375 kernel: ... fixed-purpose events: 0 Dec 13 02:03:03.172384 kernel: ... event mask: 000000000000003f Dec 13 02:03:03.172393 kernel: signal: max sigframe size: 1776 Dec 13 02:03:03.172407 kernel: rcu: Hierarchical SRCU implementation. Dec 13 02:03:03.172418 kernel: smp: Bringing up secondary CPUs ... Dec 13 02:03:03.172426 kernel: x86: Booting SMP configuration: Dec 13 02:03:03.172434 kernel: .... node #0, CPUs: #1 Dec 13 02:03:03.172442 kernel: kvm-clock: cpu 1, msr 5919b041, secondary cpu clock Dec 13 02:03:03.172451 kernel: kvm-guest: setup async PF for cpu 1 Dec 13 02:03:03.172463 kernel: kvm-guest: stealtime: cpu 1, msr 9a49c0c0 Dec 13 02:03:03.172472 kernel: #2 Dec 13 02:03:03.172481 kernel: kvm-clock: cpu 2, msr 5919b081, secondary cpu clock Dec 13 02:03:03.172490 kernel: kvm-guest: setup async PF for cpu 2 Dec 13 02:03:03.172499 kernel: kvm-guest: stealtime: cpu 2, msr 9a51c0c0 Dec 13 02:03:03.172509 kernel: #3 Dec 13 02:03:03.172523 kernel: kvm-clock: cpu 3, msr 5919b0c1, secondary cpu clock Dec 13 02:03:03.172532 kernel: kvm-guest: setup async PF for cpu 3 Dec 13 02:03:03.172546 kernel: kvm-guest: stealtime: cpu 3, msr 9a59c0c0 Dec 13 02:03:03.172562 kernel: smp: Brought up 1 node, 4 CPUs Dec 13 02:03:03.172574 kernel: smpboot: Max logical packages: 1 Dec 13 02:03:03.172583 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) Dec 13 02:03:03.172591 kernel: devtmpfs: initialized Dec 13 02:03:03.172600 kernel: x86/mm: Memory block size: 128MB Dec 13 02:03:03.172609 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 02:03:03.172617 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Dec 13 02:03:03.172626 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 02:03:03.172635 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 02:03:03.172662 kernel: audit: initializing netlink subsys (disabled) Dec 13 02:03:03.172674 kernel: audit: type=2000 audit(1734055382.287:1): state=initialized audit_enabled=0 res=1 Dec 13 02:03:03.172684 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 02:03:03.172693 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 02:03:03.172703 kernel: cpuidle: using governor menu Dec 13 02:03:03.172712 kernel: ACPI: bus type PCI registered Dec 13 02:03:03.172721 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 02:03:03.172730 kernel: dca service started, version 1.12.1 Dec 13 02:03:03.172739 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Dec 13 02:03:03.172751 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Dec 13 02:03:03.172761 kernel: PCI: Using configuration type 1 for base access Dec 13 02:03:03.172770 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 02:03:03.172779 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 02:03:03.172788 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 02:03:03.172799 kernel: ACPI: Added _OSI(Module Device) Dec 13 02:03:03.172814 kernel: ACPI: Added _OSI(Processor Device) Dec 13 02:03:03.172828 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 02:03:03.172838 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 02:03:03.172855 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 02:03:03.172868 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 02:03:03.172877 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 02:03:03.172887 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 02:03:03.172896 kernel: ACPI: Interpreter enabled Dec 13 02:03:03.172905 kernel: ACPI: PM: (supports S0 S3 S5) Dec 13 02:03:03.172914 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 02:03:03.172924 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 02:03:03.172933 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Dec 13 02:03:03.172946 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 13 02:03:03.173213 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Dec 13 02:03:03.173325 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] Dec 13 02:03:03.173427 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] Dec 13 02:03:03.173441 kernel: PCI host bridge to bus 0000:00 Dec 13 02:03:03.173566 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 02:03:03.173661 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 02:03:03.173762 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 02:03:03.173856 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] Dec 13 02:03:03.173982 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Dec 13 02:03:03.174120 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x8ffffffff window] Dec 13 02:03:03.174239 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 13 02:03:03.174378 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Dec 13 02:03:03.174519 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 Dec 13 02:03:03.174627 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfd000000-0xfdffffff pref] Dec 13 02:03:03.174731 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xfebd0000-0xfebd0fff] Dec 13 02:03:03.174863 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfebc0000-0xfebcffff pref] Dec 13 02:03:03.174970 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 02:03:03.175110 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 Dec 13 02:03:03.175276 kernel: pci 0000:00:02.0: reg 0x10: [io 0xc0c0-0xc0df] Dec 13 02:03:03.175461 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xfebd1000-0xfebd1fff] Dec 13 02:03:03.175590 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfe000000-0xfe003fff 64bit pref] Dec 13 02:03:03.175744 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 Dec 13 02:03:03.175870 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc000-0xc07f] Dec 13 02:03:03.175998 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebd2000-0xfebd2fff] Dec 13 02:03:03.176128 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe004000-0xfe007fff 64bit pref] Dec 13 02:03:03.176332 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Dec 13 02:03:03.176488 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc0e0-0xc0ff] Dec 13 02:03:03.176691 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebd3000-0xfebd3fff] Dec 13 02:03:03.176816 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe008000-0xfe00bfff 64bit pref] Dec 13 02:03:03.176996 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfeb80000-0xfebbffff pref] Dec 13 02:03:03.177282 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Dec 13 02:03:03.177473 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Dec 13 02:03:03.177691 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Dec 13 02:03:03.177829 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc100-0xc11f] Dec 13 02:03:03.178002 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfebd4000-0xfebd4fff] Dec 13 02:03:03.178137 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Dec 13 02:03:03.178259 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] Dec 13 02:03:03.178275 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 13 02:03:03.178284 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 13 02:03:03.178294 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 02:03:03.178307 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 13 02:03:03.178317 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 Dec 13 02:03:03.178326 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 Dec 13 02:03:03.178335 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Dec 13 02:03:03.178345 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Dec 13 02:03:03.178354 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 Dec 13 02:03:03.178363 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 Dec 13 02:03:03.178373 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 Dec 13 02:03:03.178382 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 Dec 13 02:03:03.178395 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 Dec 13 02:03:03.178404 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 Dec 13 02:03:03.178413 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 Dec 13 02:03:03.178422 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 Dec 13 02:03:03.178431 kernel: iommu: Default domain type: Translated Dec 13 02:03:03.178440 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 02:03:03.178558 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Dec 13 02:03:03.178658 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 02:03:03.178748 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Dec 13 02:03:03.178759 kernel: vgaarb: loaded Dec 13 02:03:03.178767 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 02:03:03.178774 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 02:03:03.178781 kernel: PTP clock support registered Dec 13 02:03:03.178789 kernel: PCI: Using ACPI for IRQ routing Dec 13 02:03:03.178796 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 02:03:03.178803 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Dec 13 02:03:03.178810 kernel: e820: reserve RAM buffer [mem 0x9cfdc000-0x9fffffff] Dec 13 02:03:03.178821 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Dec 13 02:03:03.178828 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Dec 13 02:03:03.178835 kernel: clocksource: Switched to clocksource kvm-clock Dec 13 02:03:03.178842 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 02:03:03.178850 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 02:03:03.178857 kernel: pnp: PnP ACPI init Dec 13 02:03:03.179015 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved Dec 13 02:03:03.179032 kernel: pnp: PnP ACPI: found 6 devices Dec 13 02:03:03.179041 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 02:03:03.179053 kernel: NET: Registered PF_INET protocol family Dec 13 02:03:03.179062 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 02:03:03.179071 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Dec 13 02:03:03.179080 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 02:03:03.179089 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 02:03:03.179097 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Dec 13 02:03:03.179106 kernel: TCP: Hash tables configured (established 32768 bind 32768) Dec 13 02:03:03.179115 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 02:03:03.179125 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 02:03:03.179133 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 02:03:03.179142 kernel: NET: Registered PF_XDP protocol family Dec 13 02:03:03.179272 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 02:03:03.179350 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 02:03:03.179418 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 02:03:03.179484 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] Dec 13 02:03:03.179550 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Dec 13 02:03:03.179615 kernel: pci_bus 0000:00: resource 9 [mem 0x100000000-0x8ffffffff window] Dec 13 02:03:03.179628 kernel: PCI: CLS 0 bytes, default 64 Dec 13 02:03:03.179635 kernel: Initialise system trusted keyrings Dec 13 02:03:03.179642 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Dec 13 02:03:03.179649 kernel: Key type asymmetric registered Dec 13 02:03:03.179656 kernel: Asymmetric key parser 'x509' registered Dec 13 02:03:03.179664 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 02:03:03.179671 kernel: io scheduler mq-deadline registered Dec 13 02:03:03.179678 kernel: io scheduler kyber registered Dec 13 02:03:03.179686 kernel: io scheduler bfq registered Dec 13 02:03:03.179694 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 02:03:03.179703 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 Dec 13 02:03:03.179710 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 Dec 13 02:03:03.179718 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 Dec 13 02:03:03.179725 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 02:03:03.179733 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 02:03:03.179741 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 13 02:03:03.179748 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 02:03:03.179755 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 02:03:03.179764 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 02:03:03.179853 kernel: rtc_cmos 00:04: RTC can wake from S4 Dec 13 02:03:03.179987 kernel: rtc_cmos 00:04: registered as rtc0 Dec 13 02:03:03.180097 kernel: rtc_cmos 00:04: setting system clock to 2024-12-13T02:03:02 UTC (1734055382) Dec 13 02:03:03.180173 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Dec 13 02:03:03.180269 kernel: NET: Registered PF_INET6 protocol family Dec 13 02:03:03.180277 kernel: Segment Routing with IPv6 Dec 13 02:03:03.180287 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 02:03:03.180300 kernel: NET: Registered PF_PACKET protocol family Dec 13 02:03:03.180310 kernel: Key type dns_resolver registered Dec 13 02:03:03.180319 kernel: IPI shorthand broadcast: enabled Dec 13 02:03:03.180328 kernel: sched_clock: Marking stable (470648360, 107873262)->(606989562, -28467940) Dec 13 02:03:03.180336 kernel: registered taskstats version 1 Dec 13 02:03:03.180345 kernel: Loading compiled-in X.509 certificates Dec 13 02:03:03.180355 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: d9defb0205602bee9bb670636cbe5c74194fdb5e' Dec 13 02:03:03.180364 kernel: Key type .fscrypt registered Dec 13 02:03:03.180372 kernel: Key type fscrypt-provisioning registered Dec 13 02:03:03.180382 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 02:03:03.180389 kernel: ima: Allocated hash algorithm: sha1 Dec 13 02:03:03.180396 kernel: ima: No architecture policies found Dec 13 02:03:03.180403 kernel: clk: Disabling unused clocks Dec 13 02:03:03.180411 kernel: Freeing unused kernel image (initmem) memory: 47476K Dec 13 02:03:03.180419 kernel: Write protecting the kernel read-only data: 28672k Dec 13 02:03:03.180426 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 02:03:03.180433 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 02:03:03.180442 kernel: Run /init as init process Dec 13 02:03:03.180449 kernel: with arguments: Dec 13 02:03:03.180456 kernel: /init Dec 13 02:03:03.180463 kernel: with environment: Dec 13 02:03:03.180470 kernel: HOME=/ Dec 13 02:03:03.180477 kernel: TERM=linux Dec 13 02:03:03.180483 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 02:03:03.180497 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 02:03:03.180508 systemd[1]: Detected virtualization kvm. Dec 13 02:03:03.180518 systemd[1]: Detected architecture x86-64. Dec 13 02:03:03.180526 systemd[1]: Running in initrd. Dec 13 02:03:03.180533 systemd[1]: No hostname configured, using default hostname. Dec 13 02:03:03.180541 systemd[1]: Hostname set to . Dec 13 02:03:03.180549 systemd[1]: Initializing machine ID from VM UUID. Dec 13 02:03:03.180556 systemd[1]: Queued start job for default target initrd.target. Dec 13 02:03:03.180564 systemd[1]: Started systemd-ask-password-console.path. Dec 13 02:03:03.180571 systemd[1]: Reached target cryptsetup.target. Dec 13 02:03:03.180581 systemd[1]: Reached target paths.target. Dec 13 02:03:03.180596 systemd[1]: Reached target slices.target. Dec 13 02:03:03.180605 systemd[1]: Reached target swap.target. Dec 13 02:03:03.180613 systemd[1]: Reached target timers.target. Dec 13 02:03:03.180621 systemd[1]: Listening on iscsid.socket. Dec 13 02:03:03.180631 systemd[1]: Listening on iscsiuio.socket. Dec 13 02:03:03.180639 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 02:03:03.180646 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 02:03:03.180654 systemd[1]: Listening on systemd-journald.socket. Dec 13 02:03:03.180662 systemd[1]: Listening on systemd-networkd.socket. Dec 13 02:03:03.180672 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 02:03:03.180683 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 02:03:03.180693 systemd[1]: Reached target sockets.target. Dec 13 02:03:03.180704 systemd[1]: Starting kmod-static-nodes.service... Dec 13 02:03:03.180718 systemd[1]: Finished network-cleanup.service. Dec 13 02:03:03.180729 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 02:03:03.180740 systemd[1]: Starting systemd-journald.service... Dec 13 02:03:03.180751 systemd[1]: Starting systemd-modules-load.service... Dec 13 02:03:03.180763 systemd[1]: Starting systemd-resolved.service... Dec 13 02:03:03.180774 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 02:03:03.180784 systemd[1]: Finished kmod-static-nodes.service. Dec 13 02:03:03.180801 systemd-journald[199]: Journal started Dec 13 02:03:03.180874 systemd-journald[199]: Runtime Journal (/run/log/journal/f63f7954946c42e39bf892db167eddc3) is 6.0M, max 48.5M, 42.5M free. Dec 13 02:03:03.161018 systemd-modules-load[200]: Inserted module 'overlay' Dec 13 02:03:03.242355 kernel: audit: type=1130 audit(1734055383.192:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:03.242387 systemd[1]: Started systemd-journald.service. Dec 13 02:03:03.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:03.189092 systemd-resolved[201]: Positive Trust Anchors: Dec 13 02:03:03.189105 systemd-resolved[201]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 02:03:03.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:03.189140 systemd-resolved[201]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 02:03:03.270264 kernel: audit: type=1130 audit(1734055383.243:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:03.270301 kernel: audit: type=1130 audit(1734055383.244:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:03.270475 kernel: audit: type=1130 audit(1734055383.255:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:03.271459 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 02:03:03.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:03.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:03.191864 systemd-resolved[201]: Defaulting to hostname 'linux'. Dec 13 02:03:03.244321 systemd[1]: Started systemd-resolved.service. Dec 13 02:03:03.280748 kernel: audit: type=1130 audit(1734055383.271:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:03.271000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:03.245064 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 02:03:03.284147 kernel: Bridge firewalling registered Dec 13 02:03:03.256473 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 02:03:03.271917 systemd[1]: Reached target nss-lookup.target. Dec 13 02:03:03.280781 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 02:03:03.283114 systemd-modules-load[200]: Inserted module 'br_netfilter' Dec 13 02:03:03.284688 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 02:03:03.293167 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 02:03:03.299475 kernel: audit: type=1130 audit(1734055383.293:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:03.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:03.305238 kernel: SCSI subsystem initialized Dec 13 02:03:03.313539 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 02:03:03.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:03.316115 systemd[1]: Starting dracut-cmdline.service... Dec 13 02:03:03.321833 kernel: audit: type=1130 audit(1734055383.314:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:03.324985 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 02:03:03.325053 kernel: device-mapper: uevent: version 1.0.3 Dec 13 02:03:03.325070 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 02:03:03.333893 dracut-cmdline[218]: dracut-dracut-053 Dec 13 02:03:03.333929 systemd-modules-load[200]: Inserted module 'dm_multipath' Dec 13 02:03:03.335239 systemd[1]: Finished systemd-modules-load.service. Dec 13 02:03:03.344528 kernel: audit: type=1130 audit(1734055383.336:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:03.336000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:03.338919 systemd[1]: Starting systemd-sysctl.service... Dec 13 02:03:03.350002 dracut-cmdline[218]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 02:03:03.350720 systemd[1]: Finished systemd-sysctl.service. Dec 13 02:03:03.362172 kernel: audit: type=1130 audit(1734055383.351:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:03.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:03.427246 kernel: Loading iSCSI transport class v2.0-870. Dec 13 02:03:03.444221 kernel: iscsi: registered transport (tcp) Dec 13 02:03:03.468502 kernel: iscsi: registered transport (qla4xxx) Dec 13 02:03:03.468577 kernel: QLogic iSCSI HBA Driver Dec 13 02:03:03.496001 systemd[1]: Finished dracut-cmdline.service. Dec 13 02:03:03.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:03.497500 systemd[1]: Starting dracut-pre-udev.service... Dec 13 02:03:03.554217 kernel: raid6: avx2x4 gen() 28454 MB/s Dec 13 02:03:03.571210 kernel: raid6: avx2x4 xor() 8382 MB/s Dec 13 02:03:03.588247 kernel: raid6: avx2x2 gen() 27512 MB/s Dec 13 02:03:03.605234 kernel: raid6: avx2x2 xor() 18585 MB/s Dec 13 02:03:03.622220 kernel: raid6: avx2x1 gen() 26293 MB/s Dec 13 02:03:03.639247 kernel: raid6: avx2x1 xor() 13992 MB/s Dec 13 02:03:03.656215 kernel: raid6: sse2x4 gen() 11230 MB/s Dec 13 02:03:03.673223 kernel: raid6: sse2x4 xor() 5186 MB/s Dec 13 02:03:03.690229 kernel: raid6: sse2x2 gen() 12273 MB/s Dec 13 02:03:03.707218 kernel: raid6: sse2x2 xor() 8847 MB/s Dec 13 02:03:03.724224 kernel: raid6: sse2x1 gen() 12257 MB/s Dec 13 02:03:03.741621 kernel: raid6: sse2x1 xor() 7789 MB/s Dec 13 02:03:03.741643 kernel: raid6: using algorithm avx2x4 gen() 28454 MB/s Dec 13 02:03:03.741653 kernel: raid6: .... xor() 8382 MB/s, rmw enabled Dec 13 02:03:03.742347 kernel: raid6: using avx2x2 recovery algorithm Dec 13 02:03:03.754211 kernel: xor: automatically using best checksumming function avx Dec 13 02:03:03.856217 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 02:03:03.864448 systemd[1]: Finished dracut-pre-udev.service. Dec 13 02:03:03.865000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:03.865000 audit: BPF prog-id=7 op=LOAD Dec 13 02:03:03.866000 audit: BPF prog-id=8 op=LOAD Dec 13 02:03:03.866732 systemd[1]: Starting systemd-udevd.service... Dec 13 02:03:03.878494 systemd-udevd[401]: Using default interface naming scheme 'v252'. Dec 13 02:03:03.882457 systemd[1]: Started systemd-udevd.service. Dec 13 02:03:03.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:03.883513 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 02:03:03.894208 dracut-pre-trigger[406]: rd.md=0: removing MD RAID activation Dec 13 02:03:03.918607 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 02:03:03.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:03.921092 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 02:03:03.959910 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 02:03:03.961000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:03.988601 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Dec 13 02:03:04.038610 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 02:03:04.038649 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 02:03:04.038673 kernel: AES CTR mode by8 optimization enabled Dec 13 02:03:04.038686 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 02:03:04.038707 kernel: GPT:9289727 != 19775487 Dec 13 02:03:04.038718 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 02:03:04.038733 kernel: GPT:9289727 != 19775487 Dec 13 02:03:04.038744 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 02:03:04.038756 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 02:03:04.038768 kernel: libata version 3.00 loaded. Dec 13 02:03:04.050944 kernel: ahci 0000:00:1f.2: version 3.0 Dec 13 02:03:04.076229 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 Dec 13 02:03:04.076251 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Dec 13 02:03:04.076355 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Dec 13 02:03:04.076442 kernel: scsi host0: ahci Dec 13 02:03:04.076548 kernel: scsi host1: ahci Dec 13 02:03:04.076643 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (452) Dec 13 02:03:04.076653 kernel: scsi host2: ahci Dec 13 02:03:04.076744 kernel: scsi host3: ahci Dec 13 02:03:04.076845 kernel: scsi host4: ahci Dec 13 02:03:04.076947 kernel: scsi host5: ahci Dec 13 02:03:04.077050 kernel: ata1: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4100 irq 34 Dec 13 02:03:04.077060 kernel: ata2: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4180 irq 34 Dec 13 02:03:04.077069 kernel: ata3: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4200 irq 34 Dec 13 02:03:04.077078 kernel: ata4: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4280 irq 34 Dec 13 02:03:04.077087 kernel: ata5: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4300 irq 34 Dec 13 02:03:04.077095 kernel: ata6: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4380 irq 34 Dec 13 02:03:04.072514 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 02:03:04.111745 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 02:03:04.114227 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 02:03:04.121570 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 02:03:04.127371 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 02:03:04.129900 systemd[1]: Starting disk-uuid.service... Dec 13 02:03:04.349972 disk-uuid[527]: Primary Header is updated. Dec 13 02:03:04.349972 disk-uuid[527]: Secondary Entries is updated. Dec 13 02:03:04.349972 disk-uuid[527]: Secondary Header is updated. Dec 13 02:03:04.354577 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 02:03:04.357220 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 02:03:04.385218 kernel: ata1: SATA link down (SStatus 0 SControl 300) Dec 13 02:03:04.385277 kernel: ata2: SATA link down (SStatus 0 SControl 300) Dec 13 02:03:04.391209 kernel: ata4: SATA link down (SStatus 0 SControl 300) Dec 13 02:03:04.391236 kernel: ata6: SATA link down (SStatus 0 SControl 300) Dec 13 02:03:04.438234 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) Dec 13 02:03:04.438322 kernel: ata5: SATA link down (SStatus 0 SControl 300) Dec 13 02:03:04.439221 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Dec 13 02:03:04.441431 kernel: ata3.00: applying bridge limits Dec 13 02:03:04.442224 kernel: ata3.00: configured for UDMA/100 Dec 13 02:03:04.443231 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Dec 13 02:03:04.484381 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Dec 13 02:03:04.501999 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Dec 13 02:03:04.502015 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Dec 13 02:03:05.365826 disk-uuid[528]: The operation has completed successfully. Dec 13 02:03:05.367454 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 02:03:05.391824 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 02:03:05.392000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:05.392000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:05.391919 systemd[1]: Finished disk-uuid.service. Dec 13 02:03:05.396367 systemd[1]: Starting verity-setup.service... Dec 13 02:03:05.409204 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" Dec 13 02:03:05.428297 systemd[1]: Found device dev-mapper-usr.device. Dec 13 02:03:05.431526 systemd[1]: Mounting sysusr-usr.mount... Dec 13 02:03:05.435108 systemd[1]: Finished verity-setup.service. Dec 13 02:03:05.435000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:05.497210 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 02:03:05.497436 systemd[1]: Mounted sysusr-usr.mount. Dec 13 02:03:05.499224 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 02:03:05.501456 systemd[1]: Starting ignition-setup.service... Dec 13 02:03:05.503535 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 02:03:05.511908 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 02:03:05.511947 kernel: BTRFS info (device vda6): using free space tree Dec 13 02:03:05.511960 kernel: BTRFS info (device vda6): has skinny extents Dec 13 02:03:05.520493 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 02:03:05.527765 systemd[1]: Finished ignition-setup.service. Dec 13 02:03:05.529000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:05.530024 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 02:03:05.635046 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 02:03:05.635000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:05.636000 audit: BPF prog-id=9 op=LOAD Dec 13 02:03:05.637401 systemd[1]: Starting systemd-networkd.service... Dec 13 02:03:05.660888 systemd-networkd[714]: lo: Link UP Dec 13 02:03:05.660896 systemd-networkd[714]: lo: Gained carrier Dec 13 02:03:05.661365 systemd-networkd[714]: Enumeration completed Dec 13 02:03:05.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:05.662920 ignition[633]: Ignition 2.14.0 Dec 13 02:03:05.661445 systemd[1]: Started systemd-networkd.service. Dec 13 02:03:05.662929 ignition[633]: Stage: fetch-offline Dec 13 02:03:05.662582 systemd-networkd[714]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 02:03:05.662980 ignition[633]: no configs at "/usr/lib/ignition/base.d" Dec 13 02:03:05.662767 systemd[1]: Reached target network.target. Dec 13 02:03:05.662990 ignition[633]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 02:03:05.664017 systemd-networkd[714]: eth0: Link UP Dec 13 02:03:05.663122 ignition[633]: parsed url from cmdline: "" Dec 13 02:03:05.664021 systemd-networkd[714]: eth0: Gained carrier Dec 13 02:03:05.663126 ignition[633]: no config URL provided Dec 13 02:03:05.665158 systemd[1]: Starting iscsiuio.service... Dec 13 02:03:05.663132 ignition[633]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 02:03:05.663142 ignition[633]: no config at "/usr/lib/ignition/user.ign" Dec 13 02:03:05.663163 ignition[633]: op(1): [started] loading QEMU firmware config module Dec 13 02:03:05.663169 ignition[633]: op(1): executing: "modprobe" "qemu_fw_cfg" Dec 13 02:03:05.669521 ignition[633]: op(1): [finished] loading QEMU firmware config module Dec 13 02:03:05.697363 systemd[1]: Started iscsiuio.service. Dec 13 02:03:05.699502 systemd[1]: Starting iscsid.service... Dec 13 02:03:05.698000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:05.700914 systemd-networkd[714]: eth0: DHCPv4 address 10.0.0.95/16, gateway 10.0.0.1 acquired from 10.0.0.1 Dec 13 02:03:05.704917 iscsid[721]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 02:03:05.704917 iscsid[721]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 02:03:05.704917 iscsid[721]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 02:03:05.704917 iscsid[721]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 02:03:05.704917 iscsid[721]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 02:03:05.712000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:05.717262 iscsid[721]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 02:03:05.707673 systemd[1]: Started iscsid.service. Dec 13 02:03:05.715451 systemd[1]: Starting dracut-initqueue.service... Dec 13 02:03:05.726414 systemd[1]: Finished dracut-initqueue.service. Dec 13 02:03:05.727000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:05.728232 systemd[1]: Reached target remote-fs-pre.target. Dec 13 02:03:05.730031 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 02:03:05.731870 systemd[1]: Reached target remote-fs.target. Dec 13 02:03:05.734361 systemd[1]: Starting dracut-pre-mount.service... Dec 13 02:03:05.742336 ignition[633]: parsing config with SHA512: d3ab1fb70c578b2400f1274aa82f68d04b28d3b42682a267d7df72b896ce7a259bfd1648f26c51dbca1a6f9632261877a048d60a102b737f097f1b4c48ea0f27 Dec 13 02:03:05.748121 systemd[1]: Finished dracut-pre-mount.service. Dec 13 02:03:05.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:05.756892 unknown[633]: fetched base config from "system" Dec 13 02:03:05.756904 unknown[633]: fetched user config from "qemu" Dec 13 02:03:05.757504 ignition[633]: fetch-offline: fetch-offline passed Dec 13 02:03:05.757575 ignition[633]: Ignition finished successfully Dec 13 02:03:05.760691 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 02:03:05.760000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:05.761171 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Dec 13 02:03:05.762055 systemd[1]: Starting ignition-kargs.service... Dec 13 02:03:05.777795 ignition[735]: Ignition 2.14.0 Dec 13 02:03:05.777805 ignition[735]: Stage: kargs Dec 13 02:03:05.777929 ignition[735]: no configs at "/usr/lib/ignition/base.d" Dec 13 02:03:05.777938 ignition[735]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 02:03:05.779212 ignition[735]: kargs: kargs passed Dec 13 02:03:05.779272 ignition[735]: Ignition finished successfully Dec 13 02:03:05.783208 systemd[1]: Finished ignition-kargs.service. Dec 13 02:03:05.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:05.785664 systemd[1]: Starting ignition-disks.service... Dec 13 02:03:05.792079 ignition[741]: Ignition 2.14.0 Dec 13 02:03:05.792087 ignition[741]: Stage: disks Dec 13 02:03:05.792172 ignition[741]: no configs at "/usr/lib/ignition/base.d" Dec 13 02:03:05.792181 ignition[741]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 02:03:05.796150 ignition[741]: disks: disks passed Dec 13 02:03:05.796206 ignition[741]: Ignition finished successfully Dec 13 02:03:05.798044 systemd[1]: Finished ignition-disks.service. Dec 13 02:03:05.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:05.799625 systemd[1]: Reached target initrd-root-device.target. Dec 13 02:03:05.800035 systemd[1]: Reached target local-fs-pre.target. Dec 13 02:03:05.801655 systemd[1]: Reached target local-fs.target. Dec 13 02:03:05.803156 systemd[1]: Reached target sysinit.target. Dec 13 02:03:05.804555 systemd[1]: Reached target basic.target. Dec 13 02:03:05.806824 systemd[1]: Starting systemd-fsck-root.service... Dec 13 02:03:05.817930 systemd-fsck[749]: ROOT: clean, 621/553520 files, 56021/553472 blocks Dec 13 02:03:05.823102 systemd[1]: Finished systemd-fsck-root.service. Dec 13 02:03:05.823000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:05.824167 systemd[1]: Mounting sysroot.mount... Dec 13 02:03:05.831062 systemd[1]: Mounted sysroot.mount. Dec 13 02:03:05.832340 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 02:03:05.831520 systemd[1]: Reached target initrd-root-fs.target. Dec 13 02:03:05.833951 systemd[1]: Mounting sysroot-usr.mount... Dec 13 02:03:05.834822 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 02:03:05.834862 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 02:03:05.834893 systemd[1]: Reached target ignition-diskful.target. Dec 13 02:03:05.841860 systemd[1]: Mounted sysroot-usr.mount. Dec 13 02:03:05.842961 systemd[1]: Starting initrd-setup-root.service... Dec 13 02:03:05.847469 initrd-setup-root[759]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 02:03:05.851731 initrd-setup-root[767]: cut: /sysroot/etc/group: No such file or directory Dec 13 02:03:05.855409 initrd-setup-root[775]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 02:03:05.858996 initrd-setup-root[783]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 02:03:05.888408 systemd[1]: Finished initrd-setup-root.service. Dec 13 02:03:05.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:05.890286 systemd[1]: Starting ignition-mount.service... Dec 13 02:03:05.891577 systemd[1]: Starting sysroot-boot.service... Dec 13 02:03:05.896605 bash[800]: umount: /sysroot/usr/share/oem: not mounted. Dec 13 02:03:05.907262 systemd[1]: Finished sysroot-boot.service. Dec 13 02:03:05.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:05.909018 ignition[802]: INFO : Ignition 2.14.0 Dec 13 02:03:05.909018 ignition[802]: INFO : Stage: mount Dec 13 02:03:05.909018 ignition[802]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 02:03:05.909018 ignition[802]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 02:03:05.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:05.913814 ignition[802]: INFO : mount: mount passed Dec 13 02:03:05.913814 ignition[802]: INFO : Ignition finished successfully Dec 13 02:03:05.910031 systemd[1]: Finished ignition-mount.service. Dec 13 02:03:06.441666 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 02:03:06.453213 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (811) Dec 13 02:03:06.455650 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 02:03:06.455673 kernel: BTRFS info (device vda6): using free space tree Dec 13 02:03:06.455683 kernel: BTRFS info (device vda6): has skinny extents Dec 13 02:03:06.459845 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 02:03:06.462247 systemd[1]: Starting ignition-files.service... Dec 13 02:03:06.484602 ignition[831]: INFO : Ignition 2.14.0 Dec 13 02:03:06.484602 ignition[831]: INFO : Stage: files Dec 13 02:03:06.488936 ignition[831]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 02:03:06.488936 ignition[831]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 02:03:06.488936 ignition[831]: DEBUG : files: compiled without relabeling support, skipping Dec 13 02:03:06.492639 ignition[831]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 02:03:06.492639 ignition[831]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 02:03:06.495626 ignition[831]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 02:03:06.497141 ignition[831]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 02:03:06.498502 ignition[831]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 02:03:06.498088 unknown[831]: wrote ssh authorized keys file for user: core Dec 13 02:03:06.500789 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 02:03:06.502683 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Dec 13 02:03:06.543248 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Dec 13 02:03:06.719217 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 02:03:06.719217 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Dec 13 02:03:06.723461 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 02:03:06.723461 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Dec 13 02:03:06.723461 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Dec 13 02:03:06.723461 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 02:03:06.723461 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 02:03:06.723461 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 02:03:06.723461 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 02:03:06.723461 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 02:03:06.723461 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 02:03:06.723461 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 02:03:06.723461 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 02:03:06.723461 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 02:03:06.723461 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.31.0-x86-64.raw: attempt #1 Dec 13 02:03:06.975375 systemd-networkd[714]: eth0: Gained IPv6LL Dec 13 02:03:07.199047 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Dec 13 02:03:07.600806 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 02:03:07.600806 ignition[831]: INFO : files: op(b): [started] processing unit "prepare-helm.service" Dec 13 02:03:07.605098 ignition[831]: INFO : files: op(b): op(c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 02:03:07.605098 ignition[831]: INFO : files: op(b): op(c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 02:03:07.605098 ignition[831]: INFO : files: op(b): [finished] processing unit "prepare-helm.service" Dec 13 02:03:07.605098 ignition[831]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" Dec 13 02:03:07.605098 ignition[831]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 02:03:07.605098 ignition[831]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 02:03:07.605098 ignition[831]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" Dec 13 02:03:07.605098 ignition[831]: INFO : files: op(f): [started] setting preset to disabled for "coreos-metadata.service" Dec 13 02:03:07.605098 ignition[831]: INFO : files: op(f): op(10): [started] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 02:03:07.630059 ignition[831]: INFO : files: op(f): op(10): [finished] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 02:03:07.631900 ignition[831]: INFO : files: op(f): [finished] setting preset to disabled for "coreos-metadata.service" Dec 13 02:03:07.631900 ignition[831]: INFO : files: op(11): [started] setting preset to enabled for "prepare-helm.service" Dec 13 02:03:07.635063 ignition[831]: INFO : files: op(11): [finished] setting preset to enabled for "prepare-helm.service" Dec 13 02:03:07.636704 ignition[831]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 02:03:07.638703 ignition[831]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 02:03:07.640632 ignition[831]: INFO : files: files passed Dec 13 02:03:07.640632 ignition[831]: INFO : Ignition finished successfully Dec 13 02:03:07.642877 systemd[1]: Finished ignition-files.service. Dec 13 02:03:07.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:07.645398 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 02:03:07.651170 kernel: kauditd_printk_skb: 25 callbacks suppressed Dec 13 02:03:07.651209 kernel: audit: type=1130 audit(1734055387.644:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:07.651149 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 02:03:07.664317 initrd-setup-root-after-ignition[854]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Dec 13 02:03:07.665889 initrd-setup-root-after-ignition[856]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 02:03:07.667684 systemd[1]: Starting ignition-quench.service... Dec 13 02:03:07.669679 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 02:03:07.671000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:07.672016 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 02:03:07.675955 kernel: audit: type=1130 audit(1734055387.671:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:07.672104 systemd[1]: Finished ignition-quench.service. Dec 13 02:03:07.677000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:07.677709 systemd[1]: Reached target ignition-complete.target. Dec 13 02:03:07.694919 kernel: audit: type=1130 audit(1734055387.677:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:07.694945 kernel: audit: type=1131 audit(1734055387.677:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:07.677000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:07.695564 systemd[1]: Starting initrd-parse-etc.service... Dec 13 02:03:07.706686 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 02:03:07.707686 systemd[1]: Finished initrd-parse-etc.service. Dec 13 02:03:07.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:07.709348 systemd[1]: Reached target initrd-fs.target. Dec 13 02:03:07.716480 kernel: audit: type=1130 audit(1734055387.709:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:07.716497 kernel: audit: type=1131 audit(1734055387.709:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:07.709000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:07.716506 systemd[1]: Reached target initrd.target. Dec 13 02:03:07.717963 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 02:03:07.719742 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 02:03:07.728377 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 02:03:07.729000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:07.730546 systemd[1]: Starting initrd-cleanup.service... Dec 13 02:03:07.734819 kernel: audit: type=1130 audit(1734055387.729:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:07.739010 systemd[1]: Stopped target nss-lookup.target. Dec 13 02:03:07.740620 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 02:03:07.742377 systemd[1]: Stopped target timers.target. Dec 13 02:03:07.743858 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 02:03:07.745049 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 02:03:07.746000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:07.746715 systemd[1]: Stopped target initrd.target. Dec 13 02:03:07.750950 kernel: audit: type=1131 audit(1734055387.746:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:07.751008 systemd[1]: Stopped target basic.target. Dec 13 02:03:07.752473 systemd[1]: Stopped target ignition-complete.target. Dec 13 02:03:07.754241 systemd[1]: Stopped target ignition-diskful.target. Dec 13 02:03:07.755946 systemd[1]: Stopped target initrd-root-device.target. Dec 13 02:03:07.757719 systemd[1]: Stopped target remote-fs.target. Dec 13 02:03:07.759309 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 02:03:07.760963 systemd[1]: Stopped target sysinit.target. Dec 13 02:03:07.762484 systemd[1]: Stopped target local-fs.target. Dec 13 02:03:07.764003 systemd[1]: Stopped target local-fs-pre.target. Dec 13 02:03:07.765644 systemd[1]: Stopped target swap.target. Dec 13 02:03:07.767105 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 02:03:07.768071 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 02:03:07.769000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:07.769725 systemd[1]: Stopped target cryptsetup.target. Dec 13 02:03:07.774030 kernel: audit: type=1131 audit(1734055387.769:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:07.774062 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 02:03:07.775032 systemd[1]: Stopped dracut-initqueue.service. Dec 13 02:03:07.776000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:07.776677 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 02:03:07.780727 kernel: audit: type=1131 audit(1734055387.776:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:07.776766 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 02:03:07.782000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:07.782759 systemd[1]: Stopped target paths.target. Dec 13 02:03:07.784356 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 02:03:07.789252 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 02:03:07.791123 systemd[1]: Stopped target slices.target. Dec 13 02:03:07.792636 systemd[1]: Stopped target sockets.target. Dec 13 02:03:07.794263 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 02:03:07.795121 systemd[1]: Closed iscsid.socket. Dec 13 02:03:07.796577 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 02:03:07.797515 systemd[1]: Closed iscsiuio.socket. Dec 13 02:03:07.798947 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 02:03:07.800132 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 02:03:07.801000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:07.802125 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 02:03:07.803112 systemd[1]: Stopped ignition-files.service. Dec 13 02:03:07.804000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:07.805597 systemd[1]: Stopping ignition-mount.service... Dec 13 02:03:07.807791 systemd[1]: Stopping sysroot-boot.service... Dec 13 02:03:07.809509 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 02:03:07.810305 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 02:03:07.811000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:07.813634 ignition[871]: INFO : Ignition 2.14.0 Dec 13 02:03:07.813634 ignition[871]: INFO : Stage: umount Dec 13 02:03:07.813634 ignition[871]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 02:03:07.813634 ignition[871]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 02:03:07.813634 ignition[871]: INFO : umount: umount passed Dec 13 02:03:07.813634 ignition[871]: INFO : Ignition finished successfully Dec 13 02:03:07.813000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:07.816000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:07.820000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:07.822000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:07.824000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:07.811918 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 02:03:07.812045 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 02:03:07.815655 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 02:03:07.815756 systemd[1]: Stopped ignition-mount.service. Dec 13 02:03:07.829000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:07.829000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:07.817220 systemd[1]: Stopped target network.target. Dec 13 02:03:07.818877 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 02:03:07.818918 systemd[1]: Stopped ignition-disks.service. Dec 13 02:03:07.820931 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 02:03:07.834000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:07.820970 systemd[1]: Stopped ignition-kargs.service. Dec 13 02:03:07.822469 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 02:03:07.840000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:07.822502 systemd[1]: Stopped ignition-setup.service. Dec 13 02:03:07.842000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:07.824549 systemd[1]: Stopping systemd-networkd.service... Dec 13 02:03:07.843000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:07.825408 systemd[1]: Stopping systemd-resolved.service... Dec 13 02:03:07.827967 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 02:03:07.828392 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 02:03:07.848000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:07.828458 systemd[1]: Finished initrd-cleanup.service. Dec 13 02:03:07.831233 systemd-networkd[714]: eth0: DHCPv6 lease lost Dec 13 02:03:07.850000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:07.850000 audit: BPF prog-id=9 op=UNLOAD Dec 13 02:03:07.832852 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 02:03:07.853000 audit: BPF prog-id=6 op=UNLOAD Dec 13 02:03:07.832949 systemd[1]: Stopped systemd-networkd.service. Dec 13 02:03:07.834609 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 02:03:07.856000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:07.856000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:07.856000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:07.856000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:07.862000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:07.863000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:07.834644 systemd[1]: Closed systemd-networkd.socket. Dec 13 02:03:07.837577 systemd[1]: Stopping network-cleanup.service... Dec 13 02:03:07.865000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:07.838471 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 02:03:07.867000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:07.867000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:07.838526 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 02:03:07.840537 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 02:03:07.840582 systemd[1]: Stopped systemd-sysctl.service. Dec 13 02:03:07.842384 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 02:03:07.842429 systemd[1]: Stopped systemd-modules-load.service. Dec 13 02:03:07.843501 systemd[1]: Stopping systemd-udevd.service... Dec 13 02:03:07.846352 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 02:03:07.846879 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 02:03:07.846985 systemd[1]: Stopped systemd-resolved.service. Dec 13 02:03:07.849664 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 02:03:07.849763 systemd[1]: Stopped systemd-udevd.service. Dec 13 02:03:07.852740 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 02:03:07.852785 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 02:03:07.854270 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 02:03:07.854298 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 02:03:07.855936 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 02:03:07.855968 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 02:03:07.856586 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 02:03:07.856616 systemd[1]: Stopped dracut-cmdline.service. Dec 13 02:03:07.856714 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 02:03:07.856740 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 02:03:07.857408 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 02:03:07.857613 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 13 02:03:07.857654 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Dec 13 02:03:07.860389 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 02:03:07.860422 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 02:03:07.862456 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 02:03:07.862488 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 02:03:07.864144 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Dec 13 02:03:07.864514 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 02:03:07.864584 systemd[1]: Stopped network-cleanup.service. Dec 13 02:03:07.866158 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 02:03:07.866268 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 02:03:08.031310 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 02:03:08.032000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:08.031401 systemd[1]: Stopped sysroot-boot.service. Dec 13 02:03:08.033312 systemd[1]: Reached target initrd-switch-root.target. Dec 13 02:03:08.036000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:08.034863 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 02:03:08.034915 systemd[1]: Stopped initrd-setup-root.service. Dec 13 02:03:08.037135 systemd[1]: Starting initrd-switch-root.service... Dec 13 02:03:08.052596 systemd[1]: Switching root. Dec 13 02:03:08.082960 iscsid[721]: iscsid shutting down. Dec 13 02:03:08.083053 systemd-journald[199]: Journal stopped Dec 13 02:03:10.711255 systemd-journald[199]: Received SIGTERM from PID 1 (n/a). Dec 13 02:03:10.711315 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 02:03:10.711336 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 02:03:10.711353 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 02:03:10.711366 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 02:03:10.711389 kernel: SELinux: policy capability open_perms=1 Dec 13 02:03:10.711403 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 02:03:10.711417 kernel: SELinux: policy capability always_check_network=0 Dec 13 02:03:10.711434 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 02:03:10.711449 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 02:03:10.711465 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 02:03:10.711478 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 02:03:10.711492 systemd[1]: Successfully loaded SELinux policy in 70.444ms. Dec 13 02:03:10.711516 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.726ms. Dec 13 02:03:10.711538 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 02:03:10.711553 systemd[1]: Detected virtualization kvm. Dec 13 02:03:10.711567 systemd[1]: Detected architecture x86-64. Dec 13 02:03:10.711582 systemd[1]: Detected first boot. Dec 13 02:03:10.711596 systemd[1]: Initializing machine ID from VM UUID. Dec 13 02:03:10.711609 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 02:03:10.711623 systemd[1]: Populated /etc with preset unit settings. Dec 13 02:03:10.711637 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:03:10.711659 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:03:10.711675 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:03:10.711690 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 02:03:10.711704 systemd[1]: Stopped iscsiuio.service. Dec 13 02:03:10.711719 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 02:03:10.711733 systemd[1]: Stopped iscsid.service. Dec 13 02:03:10.711768 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 02:03:10.711785 systemd[1]: Stopped initrd-switch-root.service. Dec 13 02:03:10.711799 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 02:03:10.711813 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 02:03:10.711827 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 02:03:10.711841 systemd[1]: Created slice system-getty.slice. Dec 13 02:03:10.711854 systemd[1]: Created slice system-modprobe.slice. Dec 13 02:03:10.711875 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 02:03:10.711890 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 02:03:10.711904 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 02:03:10.711918 systemd[1]: Created slice user.slice. Dec 13 02:03:10.711932 systemd[1]: Started systemd-ask-password-console.path. Dec 13 02:03:10.711946 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 02:03:10.711959 systemd[1]: Set up automount boot.automount. Dec 13 02:03:10.711979 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 02:03:10.711997 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 02:03:10.712011 systemd[1]: Stopped target initrd-fs.target. Dec 13 02:03:10.712025 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 02:03:10.712039 systemd[1]: Reached target integritysetup.target. Dec 13 02:03:10.712053 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 02:03:10.712067 systemd[1]: Reached target remote-fs.target. Dec 13 02:03:10.712081 systemd[1]: Reached target slices.target. Dec 13 02:03:10.712098 systemd[1]: Reached target swap.target. Dec 13 02:03:10.712111 systemd[1]: Reached target torcx.target. Dec 13 02:03:10.712135 systemd[1]: Reached target veritysetup.target. Dec 13 02:03:10.712151 systemd[1]: Listening on systemd-coredump.socket. Dec 13 02:03:10.712166 systemd[1]: Listening on systemd-initctl.socket. Dec 13 02:03:10.712181 systemd[1]: Listening on systemd-networkd.socket. Dec 13 02:03:10.712214 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 02:03:10.712230 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 02:03:10.712246 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 02:03:10.712262 systemd[1]: Mounting dev-hugepages.mount... Dec 13 02:03:10.712277 systemd[1]: Mounting dev-mqueue.mount... Dec 13 02:03:10.712300 systemd[1]: Mounting media.mount... Dec 13 02:03:10.712315 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:03:10.712329 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 02:03:10.712342 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 02:03:10.712357 systemd[1]: Mounting tmp.mount... Dec 13 02:03:10.712371 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 02:03:10.712385 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:03:10.712399 systemd[1]: Starting kmod-static-nodes.service... Dec 13 02:03:10.712412 systemd[1]: Starting modprobe@configfs.service... Dec 13 02:03:10.712432 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:03:10.712449 systemd[1]: Starting modprobe@drm.service... Dec 13 02:03:10.712463 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:03:10.712477 systemd[1]: Starting modprobe@fuse.service... Dec 13 02:03:10.712490 systemd[1]: Starting modprobe@loop.service... Dec 13 02:03:10.712504 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 02:03:10.712519 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 02:03:10.712532 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 02:03:10.712546 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 02:03:10.712566 kernel: loop: module loaded Dec 13 02:03:10.712580 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 02:03:10.712594 systemd[1]: Stopped systemd-journald.service. Dec 13 02:03:10.712607 kernel: fuse: init (API version 7.34) Dec 13 02:03:10.712621 systemd[1]: Starting systemd-journald.service... Dec 13 02:03:10.712635 systemd[1]: Starting systemd-modules-load.service... Dec 13 02:03:10.712648 systemd[1]: Starting systemd-network-generator.service... Dec 13 02:03:10.712662 systemd[1]: Starting systemd-remount-fs.service... Dec 13 02:03:10.712676 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 02:03:10.712696 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 02:03:10.712710 systemd[1]: Stopped verity-setup.service. Dec 13 02:03:10.712724 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:03:10.712738 systemd[1]: Mounted dev-hugepages.mount. Dec 13 02:03:10.712765 systemd[1]: Mounted dev-mqueue.mount. Dec 13 02:03:10.712779 systemd[1]: Mounted media.mount. Dec 13 02:03:10.712793 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 02:03:10.712809 systemd-journald[982]: Journal started Dec 13 02:03:10.712865 systemd-journald[982]: Runtime Journal (/run/log/journal/f63f7954946c42e39bf892db167eddc3) is 6.0M, max 48.5M, 42.5M free. Dec 13 02:03:08.161000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 02:03:08.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 02:03:08.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 02:03:08.412000 audit: BPF prog-id=10 op=LOAD Dec 13 02:03:08.412000 audit: BPF prog-id=10 op=UNLOAD Dec 13 02:03:08.412000 audit: BPF prog-id=11 op=LOAD Dec 13 02:03:08.412000 audit: BPF prog-id=11 op=UNLOAD Dec 13 02:03:08.444000 audit[905]: AVC avc: denied { associate } for pid=905 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 02:03:08.444000 audit[905]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001858e2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=888 pid=905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:08.444000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 02:03:08.445000 audit[905]: AVC avc: denied { associate } for pid=905 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 02:03:08.445000 audit[905]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001859b9 a2=1ed a3=0 items=2 ppid=888 pid=905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:08.445000 audit: CWD cwd="/" Dec 13 02:03:08.445000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:08.445000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:08.445000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 02:03:10.564000 audit: BPF prog-id=12 op=LOAD Dec 13 02:03:10.565000 audit: BPF prog-id=3 op=UNLOAD Dec 13 02:03:10.565000 audit: BPF prog-id=13 op=LOAD Dec 13 02:03:10.565000 audit: BPF prog-id=14 op=LOAD Dec 13 02:03:10.565000 audit: BPF prog-id=4 op=UNLOAD Dec 13 02:03:10.565000 audit: BPF prog-id=5 op=UNLOAD Dec 13 02:03:10.565000 audit: BPF prog-id=15 op=LOAD Dec 13 02:03:10.565000 audit: BPF prog-id=12 op=UNLOAD Dec 13 02:03:10.565000 audit: BPF prog-id=16 op=LOAD Dec 13 02:03:10.565000 audit: BPF prog-id=17 op=LOAD Dec 13 02:03:10.565000 audit: BPF prog-id=13 op=UNLOAD Dec 13 02:03:10.565000 audit: BPF prog-id=14 op=UNLOAD Dec 13 02:03:10.566000 audit: BPF prog-id=18 op=LOAD Dec 13 02:03:10.566000 audit: BPF prog-id=15 op=UNLOAD Dec 13 02:03:10.566000 audit: BPF prog-id=19 op=LOAD Dec 13 02:03:10.567000 audit: BPF prog-id=20 op=LOAD Dec 13 02:03:10.567000 audit: BPF prog-id=16 op=UNLOAD Dec 13 02:03:10.567000 audit: BPF prog-id=17 op=UNLOAD Dec 13 02:03:10.567000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:10.570000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:10.573000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:10.577000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:10.577000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:10.579000 audit: BPF prog-id=18 op=UNLOAD Dec 13 02:03:10.678000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:10.681000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:10.683000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:10.683000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:10.684000 audit: BPF prog-id=21 op=LOAD Dec 13 02:03:10.685000 audit: BPF prog-id=22 op=LOAD Dec 13 02:03:10.685000 audit: BPF prog-id=23 op=LOAD Dec 13 02:03:10.685000 audit: BPF prog-id=19 op=UNLOAD Dec 13 02:03:10.685000 audit: BPF prog-id=20 op=UNLOAD Dec 13 02:03:10.703000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:10.709000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 02:03:10.709000 audit[982]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffc28128030 a2=4000 a3=7ffc281280cc items=0 ppid=1 pid=982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:10.709000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 02:03:10.562923 systemd[1]: Queued start job for default target multi-user.target. Dec 13 02:03:08.442559 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2024-12-13T02:03:08Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:03:10.562934 systemd[1]: Unnecessary job was removed for dev-vda6.device. Dec 13 02:03:08.442789 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2024-12-13T02:03:08Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 02:03:10.567727 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 02:03:08.442821 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2024-12-13T02:03:08Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 02:03:08.442854 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2024-12-13T02:03:08Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 02:03:08.442863 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2024-12-13T02:03:08Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 02:03:08.442893 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2024-12-13T02:03:08Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 02:03:08.442904 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2024-12-13T02:03:08Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 02:03:08.443093 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2024-12-13T02:03:08Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 02:03:08.443129 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2024-12-13T02:03:08Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 02:03:08.443141 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2024-12-13T02:03:08Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 02:03:08.443732 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2024-12-13T02:03:08Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 02:03:08.443779 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2024-12-13T02:03:08Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 02:03:08.443797 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2024-12-13T02:03:08Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 02:03:08.443820 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2024-12-13T02:03:08Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 02:03:10.716374 systemd[1]: Started systemd-journald.service. Dec 13 02:03:08.443835 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2024-12-13T02:03:08Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 02:03:10.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:08.443847 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2024-12-13T02:03:08Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 02:03:10.284678 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2024-12-13T02:03:10Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:03:10.284937 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2024-12-13T02:03:10Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:03:10.285034 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2024-12-13T02:03:10Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:03:10.285180 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2024-12-13T02:03:10Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:03:10.285239 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2024-12-13T02:03:10Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 02:03:10.285310 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2024-12-13T02:03:10Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 02:03:10.717216 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 02:03:10.718264 systemd[1]: Mounted tmp.mount. Dec 13 02:03:10.719214 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 02:03:10.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:10.720395 systemd[1]: Finished kmod-static-nodes.service. Dec 13 02:03:10.721000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:10.721539 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 02:03:10.721707 systemd[1]: Finished modprobe@configfs.service. Dec 13 02:03:10.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:10.722000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:10.722879 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:03:10.723044 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:03:10.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:10.723000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:10.724286 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 02:03:10.724453 systemd[1]: Finished modprobe@drm.service. Dec 13 02:03:10.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:10.725000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:10.725543 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:03:10.725720 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:03:10.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:10.726000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:10.726984 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 02:03:10.727162 systemd[1]: Finished modprobe@fuse.service. Dec 13 02:03:10.727000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:10.727000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:10.728278 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:03:10.728435 systemd[1]: Finished modprobe@loop.service. Dec 13 02:03:10.729000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:10.729000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:10.729592 systemd[1]: Finished systemd-modules-load.service. Dec 13 02:03:10.730000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:10.730857 systemd[1]: Finished systemd-network-generator.service. Dec 13 02:03:10.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:10.732069 systemd[1]: Finished systemd-remount-fs.service. Dec 13 02:03:10.732000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:10.733389 systemd[1]: Reached target network-pre.target. Dec 13 02:03:10.735385 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 02:03:10.737128 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 02:03:10.738297 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 02:03:10.740276 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 02:03:10.741878 systemd[1]: Starting systemd-journal-flush.service... Dec 13 02:03:10.742849 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:03:10.743698 systemd[1]: Starting systemd-random-seed.service... Dec 13 02:03:10.744723 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:03:10.745579 systemd[1]: Starting systemd-sysctl.service... Dec 13 02:03:10.747806 systemd[1]: Starting systemd-sysusers.service... Dec 13 02:03:10.752311 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 02:03:10.752775 systemd-journald[982]: Time spent on flushing to /var/log/journal/f63f7954946c42e39bf892db167eddc3 is 23.180ms for 1108 entries. Dec 13 02:03:10.752775 systemd-journald[982]: System Journal (/var/log/journal/f63f7954946c42e39bf892db167eddc3) is 8.0M, max 195.6M, 187.6M free. Dec 13 02:03:10.791797 systemd-journald[982]: Received client request to flush runtime journal. Dec 13 02:03:10.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:10.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:10.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:10.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:10.754850 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 02:03:10.792261 udevadm[1008]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Dec 13 02:03:10.756056 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 02:03:10.758464 systemd[1]: Starting systemd-udev-settle.service... Dec 13 02:03:10.767032 systemd[1]: Finished systemd-sysctl.service. Dec 13 02:03:10.769433 systemd[1]: Finished systemd-random-seed.service. Dec 13 02:03:10.770827 systemd[1]: Reached target first-boot-complete.target. Dec 13 02:03:10.774426 systemd[1]: Finished systemd-sysusers.service. Dec 13 02:03:10.776644 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 02:03:10.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:10.792761 systemd[1]: Finished systemd-journal-flush.service. Dec 13 02:03:10.798033 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 02:03:10.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:11.179814 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 02:03:11.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:11.181000 audit: BPF prog-id=24 op=LOAD Dec 13 02:03:11.181000 audit: BPF prog-id=25 op=LOAD Dec 13 02:03:11.181000 audit: BPF prog-id=7 op=UNLOAD Dec 13 02:03:11.181000 audit: BPF prog-id=8 op=UNLOAD Dec 13 02:03:11.181964 systemd[1]: Starting systemd-udevd.service... Dec 13 02:03:11.197525 systemd-udevd[1013]: Using default interface naming scheme 'v252'. Dec 13 02:03:11.210576 systemd[1]: Started systemd-udevd.service. Dec 13 02:03:11.211000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:11.212000 audit: BPF prog-id=26 op=LOAD Dec 13 02:03:11.213822 systemd[1]: Starting systemd-networkd.service... Dec 13 02:03:11.221137 systemd[1]: Starting systemd-userdbd.service... Dec 13 02:03:11.219000 audit: BPF prog-id=27 op=LOAD Dec 13 02:03:11.220000 audit: BPF prog-id=28 op=LOAD Dec 13 02:03:11.220000 audit: BPF prog-id=29 op=LOAD Dec 13 02:03:11.229899 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 02:03:11.265000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:11.264246 systemd[1]: Started systemd-userdbd.service. Dec 13 02:03:11.278230 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Dec 13 02:03:11.284367 kernel: ACPI: button: Power Button [PWRF] Dec 13 02:03:11.283295 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 02:03:11.288180 (udev-worker)[1030]: could not read from '/sys/module/pcc_cpufreq/initstate': No such device Dec 13 02:03:11.295000 audit[1020]: AVC avc: denied { confidentiality } for pid=1020 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 02:03:11.295000 audit[1020]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55a9fcc55c10 a1=337fc a2=7f35cce40bc5 a3=5 items=110 ppid=1013 pid=1020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:11.295000 audit: CWD cwd="/" Dec 13 02:03:11.295000 audit: PATH item=0 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=1 name=(null) inode=13625 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=2 name=(null) inode=13625 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=3 name=(null) inode=13626 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=4 name=(null) inode=13625 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=5 name=(null) inode=13627 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=6 name=(null) inode=13625 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=7 name=(null) inode=13628 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=8 name=(null) inode=13628 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=9 name=(null) inode=13629 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=10 name=(null) inode=13628 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=11 name=(null) inode=13630 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=12 name=(null) inode=13628 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=13 name=(null) inode=13631 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=14 name=(null) inode=13628 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=15 name=(null) inode=13632 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=16 name=(null) inode=13628 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=17 name=(null) inode=13633 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=18 name=(null) inode=13625 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=19 name=(null) inode=13634 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=20 name=(null) inode=13634 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=21 name=(null) inode=13635 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=22 name=(null) inode=13634 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=23 name=(null) inode=13636 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=24 name=(null) inode=13634 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=25 name=(null) inode=13637 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=26 name=(null) inode=13634 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=27 name=(null) inode=13638 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=28 name=(null) inode=13634 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=29 name=(null) inode=13639 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=30 name=(null) inode=13625 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=31 name=(null) inode=13640 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=32 name=(null) inode=13640 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=33 name=(null) inode=13641 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=34 name=(null) inode=13640 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=35 name=(null) inode=13642 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=36 name=(null) inode=13640 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=37 name=(null) inode=13643 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=38 name=(null) inode=13640 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=39 name=(null) inode=13644 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=40 name=(null) inode=13640 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=41 name=(null) inode=13645 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=42 name=(null) inode=13625 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=43 name=(null) inode=13646 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=44 name=(null) inode=13646 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=45 name=(null) inode=13647 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=46 name=(null) inode=13646 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=47 name=(null) inode=13648 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=48 name=(null) inode=13646 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=49 name=(null) inode=13649 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=50 name=(null) inode=13646 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=51 name=(null) inode=13650 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=52 name=(null) inode=13646 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=53 name=(null) inode=13651 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=54 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=55 name=(null) inode=13652 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=56 name=(null) inode=13652 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=57 name=(null) inode=13653 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=58 name=(null) inode=13652 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=59 name=(null) inode=13654 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=60 name=(null) inode=13652 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=61 name=(null) inode=13655 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=62 name=(null) inode=13655 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=63 name=(null) inode=13656 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=64 name=(null) inode=13655 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=65 name=(null) inode=13657 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=66 name=(null) inode=13655 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=67 name=(null) inode=13658 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=68 name=(null) inode=13655 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=69 name=(null) inode=13659 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=70 name=(null) inode=13655 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=71 name=(null) inode=13660 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=72 name=(null) inode=13652 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=73 name=(null) inode=13661 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=74 name=(null) inode=13661 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=75 name=(null) inode=13662 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=76 name=(null) inode=13661 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=77 name=(null) inode=13663 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=78 name=(null) inode=13661 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=79 name=(null) inode=13664 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=80 name=(null) inode=13661 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=81 name=(null) inode=13665 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=82 name=(null) inode=13661 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=83 name=(null) inode=13666 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=84 name=(null) inode=13652 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=85 name=(null) inode=13667 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=86 name=(null) inode=13667 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=87 name=(null) inode=13668 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=88 name=(null) inode=13667 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=89 name=(null) inode=13669 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=90 name=(null) inode=13667 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=91 name=(null) inode=13670 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=92 name=(null) inode=13667 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=93 name=(null) inode=13671 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=94 name=(null) inode=13667 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=95 name=(null) inode=13672 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=96 name=(null) inode=13652 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=97 name=(null) inode=13673 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=98 name=(null) inode=13673 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=99 name=(null) inode=13674 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=100 name=(null) inode=13673 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=101 name=(null) inode=13675 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=102 name=(null) inode=13673 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=103 name=(null) inode=13676 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=104 name=(null) inode=13673 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=105 name=(null) inode=13677 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=106 name=(null) inode=13673 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=107 name=(null) inode=13678 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PATH item=109 name=(null) inode=13679 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:03:11.295000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 02:03:11.310623 systemd-networkd[1025]: lo: Link UP Dec 13 02:03:11.310633 systemd-networkd[1025]: lo: Gained carrier Dec 13 02:03:11.311011 systemd-networkd[1025]: Enumeration completed Dec 13 02:03:11.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:11.311120 systemd[1]: Started systemd-networkd.service. Dec 13 02:03:11.311129 systemd-networkd[1025]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 02:03:11.312650 systemd-networkd[1025]: eth0: Link UP Dec 13 02:03:11.312657 systemd-networkd[1025]: eth0: Gained carrier Dec 13 02:03:11.324223 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Dec 13 02:03:11.325349 systemd-networkd[1025]: eth0: DHCPv4 address 10.0.0.95/16, gateway 10.0.0.1 acquired from 10.0.0.1 Dec 13 02:03:11.332219 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Dec 13 02:03:11.348795 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Dec 13 02:03:11.348964 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Dec 13 02:03:11.349105 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 02:03:11.395228 kernel: kvm: Nested Virtualization enabled Dec 13 02:03:11.395370 kernel: SVM: kvm: Nested Paging enabled Dec 13 02:03:11.395430 kernel: SVM: Virtual VMLOAD VMSAVE supported Dec 13 02:03:11.395466 kernel: SVM: Virtual GIF supported Dec 13 02:03:11.413209 kernel: EDAC MC: Ver: 3.0.0 Dec 13 02:03:11.441542 systemd[1]: Finished systemd-udev-settle.service. Dec 13 02:03:11.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:11.443564 systemd[1]: Starting lvm2-activation-early.service... Dec 13 02:03:11.450203 lvm[1048]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 02:03:11.474797 systemd[1]: Finished lvm2-activation-early.service. Dec 13 02:03:11.475000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:11.475838 systemd[1]: Reached target cryptsetup.target. Dec 13 02:03:11.477581 systemd[1]: Starting lvm2-activation.service... Dec 13 02:03:11.480498 lvm[1049]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 02:03:11.504830 systemd[1]: Finished lvm2-activation.service. Dec 13 02:03:11.505000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:11.505799 systemd[1]: Reached target local-fs-pre.target. Dec 13 02:03:11.506690 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 02:03:11.506715 systemd[1]: Reached target local-fs.target. Dec 13 02:03:11.507560 systemd[1]: Reached target machines.target. Dec 13 02:03:11.509280 systemd[1]: Starting ldconfig.service... Dec 13 02:03:11.510708 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:03:11.510765 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:03:11.511762 systemd[1]: Starting systemd-boot-update.service... Dec 13 02:03:11.514015 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 02:03:11.516709 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 02:03:11.519297 systemd[1]: Starting systemd-sysext.service... Dec 13 02:03:11.520763 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1051 (bootctl) Dec 13 02:03:11.522183 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 02:03:11.527000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:11.526979 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 02:03:11.529323 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 02:03:11.533461 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 02:03:11.533611 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 02:03:11.542208 kernel: loop0: detected capacity change from 0 to 205544 Dec 13 02:03:11.553175 systemd-fsck[1059]: fsck.fat 4.2 (2021-01-31) Dec 13 02:03:11.553175 systemd-fsck[1059]: /dev/vda1: 789 files, 119291/258078 clusters Dec 13 02:03:11.554630 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 02:03:11.557000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:11.558573 systemd[1]: Mounting boot.mount... Dec 13 02:03:11.752338 systemd[1]: Mounted boot.mount. Dec 13 02:03:11.759236 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 02:03:11.759534 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 02:03:11.760171 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 02:03:11.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:11.765360 systemd[1]: Finished systemd-boot-update.service. Dec 13 02:03:11.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:11.777205 kernel: loop1: detected capacity change from 0 to 205544 Dec 13 02:03:11.781633 (sd-sysext)[1064]: Using extensions 'kubernetes'. Dec 13 02:03:11.782072 (sd-sysext)[1064]: Merged extensions into '/usr'. Dec 13 02:03:11.799615 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:03:11.801327 systemd[1]: Mounting usr-share-oem.mount... Dec 13 02:03:11.802603 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:03:11.804158 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:03:11.806538 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:03:11.808761 systemd[1]: Starting modprobe@loop.service... Dec 13 02:03:11.809921 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:03:11.810089 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:03:11.810282 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:03:11.813724 systemd[1]: Mounted usr-share-oem.mount. Dec 13 02:03:11.815018 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:03:11.815158 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:03:11.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:11.816000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:11.816784 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:03:11.816935 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:03:11.817000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:11.817000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:11.818652 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:03:11.818818 systemd[1]: Finished modprobe@loop.service. Dec 13 02:03:11.819000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:11.819000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:11.820470 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:03:11.820568 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:03:11.821621 systemd[1]: Finished systemd-sysext.service. Dec 13 02:03:11.822000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:11.824097 systemd[1]: Starting ensure-sysext.service... Dec 13 02:03:11.826047 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 02:03:11.828225 ldconfig[1050]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 02:03:11.831328 systemd[1]: Reloading. Dec 13 02:03:11.840240 systemd-tmpfiles[1071]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 02:03:11.841860 systemd-tmpfiles[1071]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 02:03:11.844044 systemd-tmpfiles[1071]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 02:03:11.878918 /usr/lib/systemd/system-generators/torcx-generator[1090]: time="2024-12-13T02:03:11Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:03:11.879307 /usr/lib/systemd/system-generators/torcx-generator[1090]: time="2024-12-13T02:03:11Z" level=info msg="torcx already run" Dec 13 02:03:11.942882 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:03:11.942900 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:03:11.959885 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:03:12.012000 audit: BPF prog-id=30 op=LOAD Dec 13 02:03:12.012000 audit: BPF prog-id=26 op=UNLOAD Dec 13 02:03:12.012000 audit: BPF prog-id=31 op=LOAD Dec 13 02:03:12.012000 audit: BPF prog-id=21 op=UNLOAD Dec 13 02:03:12.012000 audit: BPF prog-id=32 op=LOAD Dec 13 02:03:12.012000 audit: BPF prog-id=33 op=LOAD Dec 13 02:03:12.013000 audit: BPF prog-id=22 op=UNLOAD Dec 13 02:03:12.013000 audit: BPF prog-id=23 op=UNLOAD Dec 13 02:03:12.013000 audit: BPF prog-id=34 op=LOAD Dec 13 02:03:12.013000 audit: BPF prog-id=27 op=UNLOAD Dec 13 02:03:12.013000 audit: BPF prog-id=35 op=LOAD Dec 13 02:03:12.014000 audit: BPF prog-id=36 op=LOAD Dec 13 02:03:12.014000 audit: BPF prog-id=28 op=UNLOAD Dec 13 02:03:12.014000 audit: BPF prog-id=29 op=UNLOAD Dec 13 02:03:12.015000 audit: BPF prog-id=37 op=LOAD Dec 13 02:03:12.015000 audit: BPF prog-id=38 op=LOAD Dec 13 02:03:12.015000 audit: BPF prog-id=24 op=UNLOAD Dec 13 02:03:12.015000 audit: BPF prog-id=25 op=UNLOAD Dec 13 02:03:12.017989 systemd[1]: Finished ldconfig.service. Dec 13 02:03:12.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:12.019988 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 02:03:12.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:12.023798 systemd[1]: Starting audit-rules.service... Dec 13 02:03:12.025591 systemd[1]: Starting clean-ca-certificates.service... Dec 13 02:03:12.027621 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 02:03:12.029000 audit: BPF prog-id=39 op=LOAD Dec 13 02:03:12.030171 systemd[1]: Starting systemd-resolved.service... Dec 13 02:03:12.031000 audit: BPF prog-id=40 op=LOAD Dec 13 02:03:12.032393 systemd[1]: Starting systemd-timesyncd.service... Dec 13 02:03:12.034238 systemd[1]: Starting systemd-update-utmp.service... Dec 13 02:03:12.035758 systemd[1]: Finished clean-ca-certificates.service. Dec 13 02:03:12.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:12.040019 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:03:12.040211 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:03:12.041526 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:03:12.043389 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:03:12.043000 audit[1144]: SYSTEM_BOOT pid=1144 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 02:03:12.045304 systemd[1]: Starting modprobe@loop.service... Dec 13 02:03:12.046142 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:03:12.046264 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:03:12.046356 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 02:03:12.046426 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:03:12.047436 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 02:03:12.048000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:12.048912 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:03:12.049018 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:03:12.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:12.049000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:12.050390 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:03:12.050531 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:03:12.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:12.051000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:12.051958 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:03:12.052098 systemd[1]: Finished modprobe@loop.service. Dec 13 02:03:12.052000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:12.052000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:12.054896 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:03:12.055031 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:03:12.056336 systemd[1]: Starting systemd-update-done.service... Dec 13 02:03:12.060356 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:03:12.060562 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:03:12.061800 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:03:12.063675 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:03:12.065609 systemd[1]: Starting modprobe@loop.service... Dec 13 02:03:12.066504 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:03:12.066606 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:03:12.066697 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 02:03:12.066774 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:03:12.067736 systemd[1]: Finished systemd-update-utmp.service. Dec 13 02:03:12.067000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 02:03:12.067000 audit[1156]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff9c5339a0 a2=420 a3=0 items=0 ppid=1133 pid=1156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:12.067000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 02:03:12.068580 augenrules[1156]: No rules Dec 13 02:03:12.069337 systemd[1]: Finished audit-rules.service. Dec 13 02:03:12.070461 systemd[1]: Finished systemd-update-done.service. Dec 13 02:03:12.071809 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:03:12.071916 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:03:12.073264 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:03:12.073414 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:03:12.074873 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:03:12.075020 systemd[1]: Finished modprobe@loop.service. Dec 13 02:03:12.077471 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:03:12.077606 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:03:12.079961 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:03:12.080159 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:03:12.081410 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:03:12.083425 systemd[1]: Starting modprobe@drm.service... Dec 13 02:03:12.085347 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:03:12.087423 systemd[1]: Starting modprobe@loop.service... Dec 13 02:03:12.088354 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:03:12.088478 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:03:12.088645 systemd-resolved[1139]: Positive Trust Anchors: Dec 13 02:03:12.088959 systemd-resolved[1139]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 02:03:12.089052 systemd-resolved[1139]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 02:03:12.090013 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 02:03:12.091306 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 02:03:12.091407 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:03:12.091468 systemd-timesyncd[1140]: Contacted time server 10.0.0.1:123 (10.0.0.1). Dec 13 02:03:12.091868 systemd-timesyncd[1140]: Initial clock synchronization to Fri 2024-12-13 02:03:12.373642 UTC. Dec 13 02:03:12.092624 systemd[1]: Started systemd-timesyncd.service. Dec 13 02:03:12.094835 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:03:12.095049 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:03:12.096895 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 02:03:12.097047 systemd[1]: Finished modprobe@drm.service. Dec 13 02:03:12.097452 systemd-resolved[1139]: Defaulting to hostname 'linux'. Dec 13 02:03:12.098699 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:03:12.098852 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:03:12.100447 systemd[1]: Started systemd-resolved.service. Dec 13 02:03:12.101845 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:03:12.102012 systemd[1]: Finished modprobe@loop.service. Dec 13 02:03:12.103577 systemd[1]: Reached target network.target. Dec 13 02:03:12.104654 systemd[1]: Reached target nss-lookup.target. Dec 13 02:03:12.105711 systemd[1]: Reached target time-set.target. Dec 13 02:03:12.106715 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:03:12.106755 systemd[1]: Reached target sysinit.target. Dec 13 02:03:12.107712 systemd[1]: Started motdgen.path. Dec 13 02:03:12.108634 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 02:03:12.110027 systemd[1]: Started logrotate.timer. Dec 13 02:03:12.110971 systemd[1]: Started mdadm.timer. Dec 13 02:03:12.111739 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 02:03:12.112687 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 02:03:12.112729 systemd[1]: Reached target paths.target. Dec 13 02:03:12.113566 systemd[1]: Reached target timers.target. Dec 13 02:03:12.114835 systemd[1]: Listening on dbus.socket. Dec 13 02:03:12.116795 systemd[1]: Starting docker.socket... Dec 13 02:03:12.120328 systemd[1]: Listening on sshd.socket. Dec 13 02:03:12.121266 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:03:12.121316 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:03:12.121885 systemd[1]: Finished ensure-sysext.service. Dec 13 02:03:12.122889 systemd[1]: Listening on docker.socket. Dec 13 02:03:12.124475 systemd[1]: Reached target sockets.target. Dec 13 02:03:12.125312 systemd[1]: Reached target basic.target. Dec 13 02:03:12.126133 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 02:03:12.126156 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 02:03:12.127250 systemd[1]: Starting containerd.service... Dec 13 02:03:12.128859 systemd[1]: Starting dbus.service... Dec 13 02:03:12.130572 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 02:03:12.132452 systemd[1]: Starting extend-filesystems.service... Dec 13 02:03:12.133538 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 02:03:12.134374 systemd[1]: Starting motdgen.service... Dec 13 02:03:12.135873 jq[1176]: false Dec 13 02:03:12.136157 systemd[1]: Starting prepare-helm.service... Dec 13 02:03:12.137833 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 02:03:12.139807 systemd[1]: Starting sshd-keygen.service... Dec 13 02:03:12.142841 systemd[1]: Starting systemd-logind.service... Dec 13 02:03:12.144513 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:03:12.144579 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 02:03:12.145391 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 02:03:12.146088 systemd[1]: Starting update-engine.service... Dec 13 02:03:12.149220 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 02:03:12.149910 dbus-daemon[1175]: [system] SELinux support is enabled Dec 13 02:03:12.150796 systemd[1]: Started dbus.service. Dec 13 02:03:12.151934 jq[1195]: true Dec 13 02:03:12.153232 extend-filesystems[1177]: Found loop1 Dec 13 02:03:12.154618 extend-filesystems[1177]: Found sr0 Dec 13 02:03:12.154618 extend-filesystems[1177]: Found vda Dec 13 02:03:12.154618 extend-filesystems[1177]: Found vda1 Dec 13 02:03:12.154618 extend-filesystems[1177]: Found vda2 Dec 13 02:03:12.154618 extend-filesystems[1177]: Found vda3 Dec 13 02:03:12.154618 extend-filesystems[1177]: Found usr Dec 13 02:03:12.154618 extend-filesystems[1177]: Found vda4 Dec 13 02:03:12.154618 extend-filesystems[1177]: Found vda6 Dec 13 02:03:12.154618 extend-filesystems[1177]: Found vda7 Dec 13 02:03:12.154618 extend-filesystems[1177]: Found vda9 Dec 13 02:03:12.154618 extend-filesystems[1177]: Checking size of /dev/vda9 Dec 13 02:03:12.157241 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 02:03:12.157427 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 02:03:12.160541 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 02:03:12.163694 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 02:03:12.166637 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 02:03:12.166854 systemd[1]: Finished motdgen.service. Dec 13 02:03:12.171165 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 02:03:12.173125 jq[1200]: true Dec 13 02:03:12.171240 systemd[1]: Reached target system-config.target. Dec 13 02:03:12.173252 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 02:03:12.173279 systemd[1]: Reached target user-config.target. Dec 13 02:03:12.186240 tar[1198]: linux-amd64/helm Dec 13 02:03:12.186564 extend-filesystems[1177]: Resized partition /dev/vda9 Dec 13 02:03:12.200831 update_engine[1190]: I1213 02:03:12.200464 1190 main.cc:92] Flatcar Update Engine starting Dec 13 02:03:12.201333 extend-filesystems[1213]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 02:03:12.202809 update_engine[1190]: I1213 02:03:12.202451 1190 update_check_scheduler.cc:74] Next update check in 8m20s Dec 13 02:03:12.202835 systemd[1]: Started update-engine.service. Dec 13 02:03:12.206101 systemd[1]: Started locksmithd.service. Dec 13 02:03:12.209215 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Dec 13 02:03:12.226680 systemd-logind[1186]: Watching system buttons on /dev/input/event1 (Power Button) Dec 13 02:03:12.226726 systemd-logind[1186]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 02:03:12.227417 systemd-logind[1186]: New seat seat0. Dec 13 02:03:12.228439 env[1201]: time="2024-12-13T02:03:12.228369485Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 02:03:12.231813 systemd[1]: Started systemd-logind.service. Dec 13 02:03:12.237204 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Dec 13 02:03:12.239275 bash[1226]: Updated "/home/core/.ssh/authorized_keys" Dec 13 02:03:12.262236 env[1201]: time="2024-12-13T02:03:12.244419384Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 02:03:12.240035 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 02:03:12.262361 env[1201]: time="2024-12-13T02:03:12.262245174Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:03:12.262598 extend-filesystems[1213]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Dec 13 02:03:12.262598 extend-filesystems[1213]: old_desc_blocks = 1, new_desc_blocks = 1 Dec 13 02:03:12.262598 extend-filesystems[1213]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Dec 13 02:03:12.266724 extend-filesystems[1177]: Resized filesystem in /dev/vda9 Dec 13 02:03:12.267815 env[1201]: time="2024-12-13T02:03:12.263938951Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 02:03:12.267815 env[1201]: time="2024-12-13T02:03:12.263960231Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:03:12.267815 env[1201]: time="2024-12-13T02:03:12.264120261Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 02:03:12.267815 env[1201]: time="2024-12-13T02:03:12.264133976Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 02:03:12.267815 env[1201]: time="2024-12-13T02:03:12.264145017Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 02:03:12.267815 env[1201]: time="2024-12-13T02:03:12.264153743Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 02:03:12.267815 env[1201]: time="2024-12-13T02:03:12.264225949Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:03:12.267815 env[1201]: time="2024-12-13T02:03:12.264416737Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:03:12.267815 env[1201]: time="2024-12-13T02:03:12.264511154Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 02:03:12.267815 env[1201]: time="2024-12-13T02:03:12.264523176Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 02:03:12.267942 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 02:03:12.268134 env[1201]: time="2024-12-13T02:03:12.264562410Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 02:03:12.268134 env[1201]: time="2024-12-13T02:03:12.264572509Z" level=info msg="metadata content store policy set" policy=shared Dec 13 02:03:12.268152 systemd[1]: Finished extend-filesystems.service. Dec 13 02:03:12.276723 locksmithd[1227]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 02:03:12.277283 env[1201]: time="2024-12-13T02:03:12.277240365Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 02:03:12.277331 env[1201]: time="2024-12-13T02:03:12.277306550Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 02:03:12.277355 env[1201]: time="2024-12-13T02:03:12.277330835Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 02:03:12.277393 env[1201]: time="2024-12-13T02:03:12.277374247Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 02:03:12.277417 env[1201]: time="2024-12-13T02:03:12.277396598Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 02:03:12.277438 env[1201]: time="2024-12-13T02:03:12.277415374Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 02:03:12.277438 env[1201]: time="2024-12-13T02:03:12.277431764Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 02:03:12.277485 env[1201]: time="2024-12-13T02:03:12.277449157Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 02:03:12.277485 env[1201]: time="2024-12-13T02:03:12.277467381Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 02:03:12.277529 env[1201]: time="2024-12-13T02:03:12.277483522Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 02:03:12.277529 env[1201]: time="2024-12-13T02:03:12.277498980Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 02:03:12.277529 env[1201]: time="2024-12-13T02:03:12.277513418Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 02:03:12.277669 env[1201]: time="2024-12-13T02:03:12.277648801Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 02:03:12.277770 env[1201]: time="2024-12-13T02:03:12.277752686Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 02:03:12.278057 env[1201]: time="2024-12-13T02:03:12.278025979Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 02:03:12.278087 env[1201]: time="2024-12-13T02:03:12.278068238Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 02:03:12.278110 env[1201]: time="2024-12-13T02:03:12.278087304Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 02:03:12.278168 env[1201]: time="2024-12-13T02:03:12.278146324Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 02:03:12.278206 env[1201]: time="2024-12-13T02:03:12.278167634Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 02:03:12.278206 env[1201]: time="2024-12-13T02:03:12.278183294Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 02:03:12.278253 env[1201]: time="2024-12-13T02:03:12.278214352Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 02:03:12.278253 env[1201]: time="2024-12-13T02:03:12.278230192Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 02:03:12.278253 env[1201]: time="2024-12-13T02:03:12.278244609Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 02:03:12.278311 env[1201]: time="2024-12-13T02:03:12.278258535Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 02:03:12.278311 env[1201]: time="2024-12-13T02:03:12.278274204Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 02:03:12.278311 env[1201]: time="2024-12-13T02:03:12.278292138Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 02:03:12.278448 env[1201]: time="2024-12-13T02:03:12.278420449Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 02:03:12.278478 env[1201]: time="2024-12-13T02:03:12.278446858Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 02:03:12.278478 env[1201]: time="2024-12-13T02:03:12.278463760Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 02:03:12.278521 env[1201]: time="2024-12-13T02:03:12.278478558Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 02:03:12.278521 env[1201]: time="2024-12-13T02:03:12.278497904Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 02:03:12.278521 env[1201]: time="2024-12-13T02:03:12.278512611Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 02:03:12.278582 env[1201]: time="2024-12-13T02:03:12.278532308Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 02:03:12.278582 env[1201]: time="2024-12-13T02:03:12.278570520Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 02:03:12.278876 env[1201]: time="2024-12-13T02:03:12.278808697Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 02:03:12.279394 env[1201]: time="2024-12-13T02:03:12.278882255Z" level=info msg="Connect containerd service" Dec 13 02:03:12.279394 env[1201]: time="2024-12-13T02:03:12.278926417Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 02:03:12.279637 env[1201]: time="2024-12-13T02:03:12.279603137Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 02:03:12.279872 env[1201]: time="2024-12-13T02:03:12.279845010Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 02:03:12.279915 env[1201]: time="2024-12-13T02:03:12.279898030Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 02:03:12.279996 systemd[1]: Started containerd.service. Dec 13 02:03:12.281246 env[1201]: time="2024-12-13T02:03:12.281216111Z" level=info msg="containerd successfully booted in 0.061919s" Dec 13 02:03:12.281340 env[1201]: time="2024-12-13T02:03:12.281291543Z" level=info msg="Start subscribing containerd event" Dec 13 02:03:12.281389 env[1201]: time="2024-12-13T02:03:12.281350363Z" level=info msg="Start recovering state" Dec 13 02:03:12.281433 env[1201]: time="2024-12-13T02:03:12.281415024Z" level=info msg="Start event monitor" Dec 13 02:03:12.281433 env[1201]: time="2024-12-13T02:03:12.281432648Z" level=info msg="Start snapshots syncer" Dec 13 02:03:12.281501 env[1201]: time="2024-12-13T02:03:12.281442155Z" level=info msg="Start cni network conf syncer for default" Dec 13 02:03:12.281501 env[1201]: time="2024-12-13T02:03:12.281448958Z" level=info msg="Start streaming server" Dec 13 02:03:12.593249 tar[1198]: linux-amd64/LICENSE Dec 13 02:03:12.593366 tar[1198]: linux-amd64/README.md Dec 13 02:03:12.597015 systemd[1]: Finished prepare-helm.service. Dec 13 02:03:12.694996 sshd_keygen[1194]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 02:03:12.713698 systemd[1]: Finished sshd-keygen.service. Dec 13 02:03:12.715983 systemd[1]: Starting issuegen.service... Dec 13 02:03:12.720794 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 02:03:12.720922 systemd[1]: Finished issuegen.service. Dec 13 02:03:12.722807 systemd[1]: Starting systemd-user-sessions.service... Dec 13 02:03:12.727955 systemd[1]: Finished systemd-user-sessions.service. Dec 13 02:03:12.729990 systemd[1]: Started getty@tty1.service. Dec 13 02:03:12.731851 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 02:03:12.732888 systemd[1]: Reached target getty.target. Dec 13 02:03:12.863319 systemd-networkd[1025]: eth0: Gained IPv6LL Dec 13 02:03:12.864859 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 02:03:12.866069 systemd[1]: Reached target network-online.target. Dec 13 02:03:12.868232 systemd[1]: Starting kubelet.service... Dec 13 02:03:13.445661 systemd[1]: Started kubelet.service. Dec 13 02:03:13.447162 systemd[1]: Reached target multi-user.target. Dec 13 02:03:13.449524 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 02:03:13.456697 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 02:03:13.456908 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 02:03:13.458424 systemd[1]: Startup finished in 851ms (kernel) + 5.198s (initrd) + 5.369s (userspace) = 11.419s. Dec 13 02:03:13.871968 kubelet[1256]: E1213 02:03:13.871831 1256 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 02:03:13.874091 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 02:03:13.874294 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 02:03:21.704965 systemd[1]: Created slice system-sshd.slice. Dec 13 02:03:21.705990 systemd[1]: Started sshd@0-10.0.0.95:22-10.0.0.1:52740.service. Dec 13 02:03:21.748567 sshd[1266]: Accepted publickey for core from 10.0.0.1 port 52740 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:03:21.749825 sshd[1266]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:03:21.757968 systemd-logind[1186]: New session 1 of user core. Dec 13 02:03:21.758791 systemd[1]: Created slice user-500.slice. Dec 13 02:03:21.759772 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 02:03:21.767492 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 02:03:21.768594 systemd[1]: Starting user@500.service... Dec 13 02:03:21.771433 (systemd)[1269]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:03:21.837915 systemd[1269]: Queued start job for default target default.target. Dec 13 02:03:21.838349 systemd[1269]: Reached target paths.target. Dec 13 02:03:21.838369 systemd[1269]: Reached target sockets.target. Dec 13 02:03:21.838382 systemd[1269]: Reached target timers.target. Dec 13 02:03:21.838393 systemd[1269]: Reached target basic.target. Dec 13 02:03:21.838430 systemd[1269]: Reached target default.target. Dec 13 02:03:21.838455 systemd[1269]: Startup finished in 61ms. Dec 13 02:03:21.838499 systemd[1]: Started user@500.service. Dec 13 02:03:21.839409 systemd[1]: Started session-1.scope. Dec 13 02:03:21.889415 systemd[1]: Started sshd@1-10.0.0.95:22-10.0.0.1:52756.service. Dec 13 02:03:21.927390 sshd[1278]: Accepted publickey for core from 10.0.0.1 port 52756 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:03:21.928836 sshd[1278]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:03:21.933016 systemd-logind[1186]: New session 2 of user core. Dec 13 02:03:21.934386 systemd[1]: Started session-2.scope. Dec 13 02:03:21.990238 sshd[1278]: pam_unix(sshd:session): session closed for user core Dec 13 02:03:21.993318 systemd[1]: Started sshd@2-10.0.0.95:22-10.0.0.1:52768.service. Dec 13 02:03:21.993871 systemd[1]: sshd@1-10.0.0.95:22-10.0.0.1:52756.service: Deactivated successfully. Dec 13 02:03:21.994606 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 02:03:21.995136 systemd-logind[1186]: Session 2 logged out. Waiting for processes to exit. Dec 13 02:03:21.996016 systemd-logind[1186]: Removed session 2. Dec 13 02:03:22.033084 sshd[1283]: Accepted publickey for core from 10.0.0.1 port 52768 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:03:22.034401 sshd[1283]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:03:22.038368 systemd-logind[1186]: New session 3 of user core. Dec 13 02:03:22.039133 systemd[1]: Started session-3.scope. Dec 13 02:03:22.091588 sshd[1283]: pam_unix(sshd:session): session closed for user core Dec 13 02:03:22.097279 systemd[1]: Started sshd@3-10.0.0.95:22-10.0.0.1:52772.service. Dec 13 02:03:22.097856 systemd[1]: sshd@2-10.0.0.95:22-10.0.0.1:52768.service: Deactivated successfully. Dec 13 02:03:22.098615 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 02:03:22.099539 systemd-logind[1186]: Session 3 logged out. Waiting for processes to exit. Dec 13 02:03:22.101397 systemd-logind[1186]: Removed session 3. Dec 13 02:03:22.141275 sshd[1289]: Accepted publickey for core from 10.0.0.1 port 52772 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:03:22.142718 sshd[1289]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:03:22.146517 systemd-logind[1186]: New session 4 of user core. Dec 13 02:03:22.147380 systemd[1]: Started session-4.scope. Dec 13 02:03:22.202381 sshd[1289]: pam_unix(sshd:session): session closed for user core Dec 13 02:03:22.204998 systemd[1]: sshd@3-10.0.0.95:22-10.0.0.1:52772.service: Deactivated successfully. Dec 13 02:03:22.205625 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 02:03:22.206185 systemd-logind[1186]: Session 4 logged out. Waiting for processes to exit. Dec 13 02:03:22.207453 systemd[1]: Started sshd@4-10.0.0.95:22-10.0.0.1:52774.service. Dec 13 02:03:22.208254 systemd-logind[1186]: Removed session 4. Dec 13 02:03:22.245700 sshd[1296]: Accepted publickey for core from 10.0.0.1 port 52774 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:03:22.246772 sshd[1296]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:03:22.250419 systemd-logind[1186]: New session 5 of user core. Dec 13 02:03:22.251446 systemd[1]: Started session-5.scope. Dec 13 02:03:22.308623 sudo[1299]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 02:03:22.308854 sudo[1299]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:03:22.317432 dbus-daemon[1175]: \xd0\xedl\xa60V: received setenforce notice (enforcing=1038124256) Dec 13 02:03:22.319516 sudo[1299]: pam_unix(sudo:session): session closed for user root Dec 13 02:03:22.321367 sshd[1296]: pam_unix(sshd:session): session closed for user core Dec 13 02:03:22.324391 systemd[1]: sshd@4-10.0.0.95:22-10.0.0.1:52774.service: Deactivated successfully. Dec 13 02:03:22.324916 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 02:03:22.325451 systemd-logind[1186]: Session 5 logged out. Waiting for processes to exit. Dec 13 02:03:22.326764 systemd[1]: Started sshd@5-10.0.0.95:22-10.0.0.1:52784.service. Dec 13 02:03:22.327469 systemd-logind[1186]: Removed session 5. Dec 13 02:03:22.365711 sshd[1303]: Accepted publickey for core from 10.0.0.1 port 52784 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:03:22.366790 sshd[1303]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:03:22.370291 systemd-logind[1186]: New session 6 of user core. Dec 13 02:03:22.371102 systemd[1]: Started session-6.scope. Dec 13 02:03:22.425319 sudo[1307]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 02:03:22.425516 sudo[1307]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:03:22.428513 sudo[1307]: pam_unix(sudo:session): session closed for user root Dec 13 02:03:22.433289 sudo[1306]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 02:03:22.433496 sudo[1306]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:03:22.441835 systemd[1]: Stopping audit-rules.service... Dec 13 02:03:22.441000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 02:03:22.442890 auditctl[1310]: No rules Dec 13 02:03:22.443293 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 02:03:22.443468 systemd[1]: Stopped audit-rules.service. Dec 13 02:03:22.443752 kernel: kauditd_printk_skb: 281 callbacks suppressed Dec 13 02:03:22.443815 kernel: audit: type=1305 audit(1734055402.441:203): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 02:03:22.444809 systemd[1]: Starting audit-rules.service... Dec 13 02:03:22.441000 audit[1310]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffeab6188f0 a2=420 a3=0 items=0 ppid=1 pid=1310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:22.455120 kernel: audit: type=1300 audit(1734055402.441:203): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffeab6188f0 a2=420 a3=0 items=0 ppid=1 pid=1310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:22.455169 kernel: audit: type=1327 audit(1734055402.441:203): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 02:03:22.441000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 02:03:22.456462 kernel: audit: type=1131 audit(1734055402.442:204): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:22.442000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:22.459299 augenrules[1327]: No rules Dec 13 02:03:22.460005 systemd[1]: Finished audit-rules.service. Dec 13 02:03:22.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:22.463695 sudo[1306]: pam_unix(sudo:session): session closed for user root Dec 13 02:03:22.462000 audit[1306]: USER_END pid=1306 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:03:22.467410 kernel: audit: type=1130 audit(1734055402.459:205): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:22.467446 kernel: audit: type=1106 audit(1734055402.462:206): pid=1306 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:03:22.467490 kernel: audit: type=1104 audit(1734055402.462:207): pid=1306 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:03:22.462000 audit[1306]: CRED_DISP pid=1306 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:03:22.467763 sshd[1303]: pam_unix(sshd:session): session closed for user core Dec 13 02:03:22.470041 systemd[1]: sshd@5-10.0.0.95:22-10.0.0.1:52784.service: Deactivated successfully. Dec 13 02:03:22.470658 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 02:03:22.468000 audit[1303]: USER_END pid=1303 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:22.471152 systemd-logind[1186]: Session 6 logged out. Waiting for processes to exit. Dec 13 02:03:22.474770 systemd[1]: Started sshd@6-10.0.0.95:22-10.0.0.1:52788.service. Dec 13 02:03:22.475302 systemd-logind[1186]: Removed session 6. Dec 13 02:03:22.475427 kernel: audit: type=1106 audit(1734055402.468:208): pid=1303 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:22.475466 kernel: audit: type=1104 audit(1734055402.468:209): pid=1303 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:22.468000 audit[1303]: CRED_DISP pid=1303 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:22.478882 kernel: audit: type=1131 audit(1734055402.470:210): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.95:22-10.0.0.1:52784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:22.470000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.95:22-10.0.0.1:52784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:22.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.95:22-10.0.0.1:52788 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:22.511000 audit[1333]: USER_ACCT pid=1333 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:22.513118 sshd[1333]: Accepted publickey for core from 10.0.0.1 port 52788 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:03:22.512000 audit[1333]: CRED_ACQ pid=1333 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:22.512000 audit[1333]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc2db97240 a2=3 a3=0 items=0 ppid=1 pid=1333 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:22.512000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:03:22.514297 sshd[1333]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:03:22.517577 systemd-logind[1186]: New session 7 of user core. Dec 13 02:03:22.518541 systemd[1]: Started session-7.scope. Dec 13 02:03:22.520000 audit[1333]: USER_START pid=1333 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:22.522000 audit[1335]: CRED_ACQ pid=1335 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:22.570000 audit[1336]: USER_ACCT pid=1336 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:03:22.571091 sudo[1336]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 02:03:22.570000 audit[1336]: CRED_REFR pid=1336 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:03:22.571402 sudo[1336]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:03:22.572000 audit[1336]: USER_START pid=1336 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:03:22.821727 systemd[1]: Starting docker.service... Dec 13 02:03:22.857985 env[1348]: time="2024-12-13T02:03:22.857907307Z" level=info msg="Starting up" Dec 13 02:03:22.859780 env[1348]: time="2024-12-13T02:03:22.859716736Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 02:03:22.859780 env[1348]: time="2024-12-13T02:03:22.859760629Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 02:03:22.859967 env[1348]: time="2024-12-13T02:03:22.859811710Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 02:03:22.859967 env[1348]: time="2024-12-13T02:03:22.859829965Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 02:03:22.861702 env[1348]: time="2024-12-13T02:03:22.861674397Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 02:03:22.861702 env[1348]: time="2024-12-13T02:03:22.861694648Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 02:03:22.861778 env[1348]: time="2024-12-13T02:03:22.861713045Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 02:03:22.861778 env[1348]: time="2024-12-13T02:03:22.861722775Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 02:03:22.870014 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport1722278566-merged.mount: Deactivated successfully. Dec 13 02:03:22.898419 env[1348]: time="2024-12-13T02:03:22.898365611Z" level=info msg="Loading containers: start." Dec 13 02:03:22.954000 audit[1382]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1382 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:22.954000 audit[1382]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffc829b0d70 a2=0 a3=7ffc829b0d5c items=0 ppid=1348 pid=1382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:22.954000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Dec 13 02:03:22.956000 audit[1384]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1384 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:22.956000 audit[1384]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fff119ed0f0 a2=0 a3=7fff119ed0dc items=0 ppid=1348 pid=1384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:22.956000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Dec 13 02:03:22.958000 audit[1386]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1386 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:22.958000 audit[1386]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fffa27ac490 a2=0 a3=7fffa27ac47c items=0 ppid=1348 pid=1386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:22.958000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 02:03:22.960000 audit[1388]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1388 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:22.960000 audit[1388]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff18893e90 a2=0 a3=7fff18893e7c items=0 ppid=1348 pid=1388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:22.960000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 02:03:22.961000 audit[1390]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1390 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:22.961000 audit[1390]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe09baecc0 a2=0 a3=7ffe09baecac items=0 ppid=1348 pid=1390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:22.961000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Dec 13 02:03:22.980000 audit[1395]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1395 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:22.980000 audit[1395]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc411d9520 a2=0 a3=7ffc411d950c items=0 ppid=1348 pid=1395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:22.980000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Dec 13 02:03:22.990000 audit[1397]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1397 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:22.990000 audit[1397]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdb5087d30 a2=0 a3=7ffdb5087d1c items=0 ppid=1348 pid=1397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:22.990000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Dec 13 02:03:22.992000 audit[1399]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1399 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:22.992000 audit[1399]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffc1820abf0 a2=0 a3=7ffc1820abdc items=0 ppid=1348 pid=1399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:22.992000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Dec 13 02:03:22.994000 audit[1401]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1401 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:22.994000 audit[1401]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffca0d58c60 a2=0 a3=7ffca0d58c4c items=0 ppid=1348 pid=1401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:22.994000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 02:03:23.003000 audit[1405]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1405 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:23.003000 audit[1405]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fff61bfc8b0 a2=0 a3=7fff61bfc89c items=0 ppid=1348 pid=1405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:23.003000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 02:03:23.009000 audit[1406]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1406 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:23.009000 audit[1406]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffdd560eb00 a2=0 a3=7ffdd560eaec items=0 ppid=1348 pid=1406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:23.009000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 02:03:23.019220 kernel: Initializing XFRM netlink socket Dec 13 02:03:23.052960 env[1348]: time="2024-12-13T02:03:23.052906893Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Dec 13 02:03:23.068000 audit[1414]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1414 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:23.068000 audit[1414]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffd6df93b10 a2=0 a3=7ffd6df93afc items=0 ppid=1348 pid=1414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:23.068000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Dec 13 02:03:23.078000 audit[1417]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1417 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:23.078000 audit[1417]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffd91f20660 a2=0 a3=7ffd91f2064c items=0 ppid=1348 pid=1417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:23.078000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Dec 13 02:03:23.081000 audit[1420]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1420 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:23.081000 audit[1420]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffdbebfbeb0 a2=0 a3=7ffdbebfbe9c items=0 ppid=1348 pid=1420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:23.081000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Dec 13 02:03:23.083000 audit[1422]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1422 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:23.083000 audit[1422]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc85e86330 a2=0 a3=7ffc85e8631c items=0 ppid=1348 pid=1422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:23.083000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Dec 13 02:03:23.085000 audit[1424]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1424 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:23.085000 audit[1424]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffee2c98c80 a2=0 a3=7ffee2c98c6c items=0 ppid=1348 pid=1424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:23.085000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Dec 13 02:03:23.087000 audit[1426]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1426 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:23.087000 audit[1426]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fffa3b35300 a2=0 a3=7fffa3b352ec items=0 ppid=1348 pid=1426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:23.087000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Dec 13 02:03:23.090000 audit[1428]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1428 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:23.090000 audit[1428]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffe96f891c0 a2=0 a3=7ffe96f891ac items=0 ppid=1348 pid=1428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:23.090000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Dec 13 02:03:23.098000 audit[1431]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1431 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:23.098000 audit[1431]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffd2a2b6f80 a2=0 a3=7ffd2a2b6f6c items=0 ppid=1348 pid=1431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:23.098000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Dec 13 02:03:23.100000 audit[1433]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1433 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:23.100000 audit[1433]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffff3227100 a2=0 a3=7ffff32270ec items=0 ppid=1348 pid=1433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:23.100000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 02:03:23.102000 audit[1435]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1435 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:23.102000 audit[1435]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffd208dbb20 a2=0 a3=7ffd208dbb0c items=0 ppid=1348 pid=1435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:23.102000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 02:03:23.105000 audit[1437]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1437 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:23.105000 audit[1437]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffc6343af0 a2=0 a3=7fffc6343adc items=0 ppid=1348 pid=1437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:23.105000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Dec 13 02:03:23.106746 systemd-networkd[1025]: docker0: Link UP Dec 13 02:03:23.118000 audit[1441]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1441 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:23.118000 audit[1441]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe6c614700 a2=0 a3=7ffe6c6146ec items=0 ppid=1348 pid=1441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:23.118000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 02:03:23.123000 audit[1442]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1442 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:23.123000 audit[1442]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fffa9659cd0 a2=0 a3=7fffa9659cbc items=0 ppid=1348 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:23.123000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 02:03:23.125113 env[1348]: time="2024-12-13T02:03:23.125055585Z" level=info msg="Loading containers: done." Dec 13 02:03:23.142853 env[1348]: time="2024-12-13T02:03:23.142778449Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Dec 13 02:03:23.143145 env[1348]: time="2024-12-13T02:03:23.142953848Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Dec 13 02:03:23.143145 env[1348]: time="2024-12-13T02:03:23.143045228Z" level=info msg="Daemon has completed initialization" Dec 13 02:03:23.161416 systemd[1]: Started docker.service. Dec 13 02:03:23.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:23.169065 env[1348]: time="2024-12-13T02:03:23.168983346Z" level=info msg="API listen on /run/docker.sock" Dec 13 02:03:23.859509 env[1201]: time="2024-12-13T02:03:23.859424301Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.4\"" Dec 13 02:03:24.125169 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 02:03:24.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:24.124000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:24.125453 systemd[1]: Stopped kubelet.service. Dec 13 02:03:24.127223 systemd[1]: Starting kubelet.service... Dec 13 02:03:24.234390 systemd[1]: Started kubelet.service. Dec 13 02:03:24.233000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:24.387750 kubelet[1482]: E1213 02:03:24.387564 1482 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 02:03:24.390756 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 02:03:24.390882 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 02:03:24.390000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 02:03:25.046492 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3821016759.mount: Deactivated successfully. Dec 13 02:03:26.524719 env[1201]: time="2024-12-13T02:03:26.524656207Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:26.526963 env[1201]: time="2024-12-13T02:03:26.526910540Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bdc2eadbf366279693097982a31da61cc2f1d90f07ada3f4b3b91251a18f665e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:26.528793 env[1201]: time="2024-12-13T02:03:26.528762374Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:26.530766 env[1201]: time="2024-12-13T02:03:26.530736765Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:ace6a943b058439bd6daeb74f152e7c36e6fc0b5e481cdff9364cd6ca0473e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:26.531327 env[1201]: time="2024-12-13T02:03:26.531297778Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.4\" returns image reference \"sha256:bdc2eadbf366279693097982a31da61cc2f1d90f07ada3f4b3b91251a18f665e\"" Dec 13 02:03:26.532707 env[1201]: time="2024-12-13T02:03:26.532683533Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.4\"" Dec 13 02:03:28.100047 env[1201]: time="2024-12-13T02:03:28.099976817Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:28.101854 env[1201]: time="2024-12-13T02:03:28.101785814Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:359b9f2307326a4c66172318ca63ee9792c3146ca57d53329239bd123ea70079,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:28.103834 env[1201]: time="2024-12-13T02:03:28.103794742Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:28.105635 env[1201]: time="2024-12-13T02:03:28.105606296Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:4bd1d4a449e7a1a4f375bd7c71abf48a95f8949b38f725ded255077329f21f7b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:28.107221 env[1201]: time="2024-12-13T02:03:28.107153858Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.4\" returns image reference \"sha256:359b9f2307326a4c66172318ca63ee9792c3146ca57d53329239bd123ea70079\"" Dec 13 02:03:28.107750 env[1201]: time="2024-12-13T02:03:28.107714390Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.4\"" Dec 13 02:03:29.698840 env[1201]: time="2024-12-13T02:03:29.698754264Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:29.703284 env[1201]: time="2024-12-13T02:03:29.703216025Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3a66234066fe10fa299c0a52265f90a107450f0372652867118cd9007940d674,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:29.705255 env[1201]: time="2024-12-13T02:03:29.705223169Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:29.707135 env[1201]: time="2024-12-13T02:03:29.707091550Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:1a3081cb7d21763d22eb2c0781cc462d89f501ed523ad558dea1226f128fbfdd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:29.707899 env[1201]: time="2024-12-13T02:03:29.707846642Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.4\" returns image reference \"sha256:3a66234066fe10fa299c0a52265f90a107450f0372652867118cd9007940d674\"" Dec 13 02:03:29.708581 env[1201]: time="2024-12-13T02:03:29.708552317Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.4\"" Dec 13 02:03:31.103637 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2964376547.mount: Deactivated successfully. Dec 13 02:03:32.484437 env[1201]: time="2024-12-13T02:03:32.484357808Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:32.486718 env[1201]: time="2024-12-13T02:03:32.486677271Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ebf80573666f86f115452db568feb34f6f771c3bdc7bfed14b9577f992cfa300,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:32.488343 env[1201]: time="2024-12-13T02:03:32.488305397Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:32.489816 env[1201]: time="2024-12-13T02:03:32.489756951Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:1739b3febca392035bf6edfe31efdfa55226be7b57389b2001ae357f7dcb99cf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:32.490126 env[1201]: time="2024-12-13T02:03:32.490099454Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.4\" returns image reference \"sha256:ebf80573666f86f115452db568feb34f6f771c3bdc7bfed14b9577f992cfa300\"" Dec 13 02:03:32.490767 env[1201]: time="2024-12-13T02:03:32.490703264Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Dec 13 02:03:33.102826 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3274028480.mount: Deactivated successfully. Dec 13 02:03:34.641846 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 02:03:34.650073 kernel: kauditd_printk_skb: 88 callbacks suppressed Dec 13 02:03:34.650131 kernel: audit: type=1130 audit(1734055414.640:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:34.650155 kernel: audit: type=1131 audit(1734055414.640:250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:34.640000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:34.640000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:34.642050 systemd[1]: Stopped kubelet.service. Dec 13 02:03:34.930867 systemd[1]: Starting kubelet.service... Dec 13 02:03:35.020777 systemd[1]: Started kubelet.service. Dec 13 02:03:35.019000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:35.025220 kernel: audit: type=1130 audit(1734055415.019:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:35.277331 kubelet[1495]: E1213 02:03:35.276952 1495 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 02:03:35.279615 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 02:03:35.279757 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 02:03:35.276000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 02:03:35.284216 kernel: audit: type=1131 audit(1734055415.276:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 02:03:35.609463 env[1201]: time="2024-12-13T02:03:35.609282178Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:35.612104 env[1201]: time="2024-12-13T02:03:35.612055495Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:35.614555 env[1201]: time="2024-12-13T02:03:35.614508333Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:35.617615 env[1201]: time="2024-12-13T02:03:35.617558675Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:35.618123 env[1201]: time="2024-12-13T02:03:35.618082442Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Dec 13 02:03:35.618663 env[1201]: time="2024-12-13T02:03:35.618622240Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" Dec 13 02:03:36.198071 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1160773638.mount: Deactivated successfully. Dec 13 02:03:36.204337 env[1201]: time="2024-12-13T02:03:36.204274514Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:36.206235 env[1201]: time="2024-12-13T02:03:36.206199271Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:36.207799 env[1201]: time="2024-12-13T02:03:36.207754905Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:36.209103 env[1201]: time="2024-12-13T02:03:36.209062729Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:36.209518 env[1201]: time="2024-12-13T02:03:36.209476569Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" Dec 13 02:03:36.209943 env[1201]: time="2024-12-13T02:03:36.209910531Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\"" Dec 13 02:03:36.784724 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1467107753.mount: Deactivated successfully. Dec 13 02:03:40.669636 env[1201]: time="2024-12-13T02:03:40.669551151Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:40.672269 env[1201]: time="2024-12-13T02:03:40.672205998Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:40.674573 env[1201]: time="2024-12-13T02:03:40.674531944Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:40.676692 env[1201]: time="2024-12-13T02:03:40.676663640Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:a6dc63e6e8cfa0307d7851762fa6b629afb18f28d8aa3fab5a6e91b4af60026a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:40.677598 env[1201]: time="2024-12-13T02:03:40.677563077Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\" returns image reference \"sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4\"" Dec 13 02:03:42.656560 systemd[1]: Stopped kubelet.service. Dec 13 02:03:42.656000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:42.658859 systemd[1]: Starting kubelet.service... Dec 13 02:03:42.656000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:42.664849 kernel: audit: type=1130 audit(1734055422.656:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:42.664963 kernel: audit: type=1131 audit(1734055422.656:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:42.681575 systemd[1]: Reloading. Dec 13 02:03:42.748595 /usr/lib/systemd/system-generators/torcx-generator[1547]: time="2024-12-13T02:03:42Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:03:42.749111 /usr/lib/systemd/system-generators/torcx-generator[1547]: time="2024-12-13T02:03:42Z" level=info msg="torcx already run" Dec 13 02:03:43.033010 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:03:43.033024 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:03:43.049935 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:03:43.127937 kernel: audit: type=1400 audit(1734055423.116:255): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.128063 kernel: audit: type=1400 audit(1734055423.116:256): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.128086 kernel: audit: type=1400 audit(1734055423.116:257): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.135290 kernel: audit: type=1400 audit(1734055423.116:258): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.135356 kernel: audit: type=1400 audit(1734055423.116:259): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.135386 kernel: audit: type=1400 audit(1734055423.116:260): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.138802 kernel: audit: type=1400 audit(1734055423.116:261): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.142256 kernel: audit: type=1400 audit(1734055423.116:262): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.123000 audit: BPF prog-id=46 op=LOAD Dec 13 02:03:43.123000 audit: BPF prog-id=39 op=UNLOAD Dec 13 02:03:43.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.126000 audit: BPF prog-id=47 op=LOAD Dec 13 02:03:43.126000 audit: BPF prog-id=44 op=UNLOAD Dec 13 02:03:43.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.134000 audit: BPF prog-id=48 op=LOAD Dec 13 02:03:43.134000 audit: BPF prog-id=30 op=UNLOAD Dec 13 02:03:43.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.141000 audit: BPF prog-id=49 op=LOAD Dec 13 02:03:43.141000 audit: BPF prog-id=41 op=UNLOAD Dec 13 02:03:43.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.144000 audit: BPF prog-id=50 op=LOAD Dec 13 02:03:43.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.144000 audit: BPF prog-id=51 op=LOAD Dec 13 02:03:43.144000 audit: BPF prog-id=42 op=UNLOAD Dec 13 02:03:43.144000 audit: BPF prog-id=43 op=UNLOAD Dec 13 02:03:43.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.145000 audit: BPF prog-id=52 op=LOAD Dec 13 02:03:43.145000 audit: BPF prog-id=31 op=UNLOAD Dec 13 02:03:43.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.145000 audit: BPF prog-id=53 op=LOAD Dec 13 02:03:43.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.145000 audit: BPF prog-id=54 op=LOAD Dec 13 02:03:43.145000 audit: BPF prog-id=32 op=UNLOAD Dec 13 02:03:43.145000 audit: BPF prog-id=33 op=UNLOAD Dec 13 02:03:43.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.146000 audit: BPF prog-id=55 op=LOAD Dec 13 02:03:43.147000 audit: BPF prog-id=40 op=UNLOAD Dec 13 02:03:43.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.148000 audit: BPF prog-id=56 op=LOAD Dec 13 02:03:43.148000 audit: BPF prog-id=34 op=UNLOAD Dec 13 02:03:43.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.148000 audit: BPF prog-id=57 op=LOAD Dec 13 02:03:43.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.148000 audit: BPF prog-id=58 op=LOAD Dec 13 02:03:43.148000 audit: BPF prog-id=35 op=UNLOAD Dec 13 02:03:43.148000 audit: BPF prog-id=36 op=UNLOAD Dec 13 02:03:43.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.150000 audit: BPF prog-id=59 op=LOAD Dec 13 02:03:43.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.150000 audit: BPF prog-id=60 op=LOAD Dec 13 02:03:43.150000 audit: BPF prog-id=37 op=UNLOAD Dec 13 02:03:43.150000 audit: BPF prog-id=38 op=UNLOAD Dec 13 02:03:43.163825 systemd[1]: Started kubelet.service. Dec 13 02:03:43.162000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:43.165912 systemd[1]: Stopping kubelet.service... Dec 13 02:03:43.166270 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 02:03:43.166492 systemd[1]: Stopped kubelet.service. Dec 13 02:03:43.165000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:43.168321 systemd[1]: Starting kubelet.service... Dec 13 02:03:43.249588 systemd[1]: Started kubelet.service. Dec 13 02:03:43.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:43.283182 kubelet[1597]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 02:03:43.283182 kubelet[1597]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 02:03:43.283182 kubelet[1597]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 02:03:43.284354 kubelet[1597]: I1213 02:03:43.284312 1597 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 02:03:43.578358 kubelet[1597]: I1213 02:03:43.578251 1597 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" Dec 13 02:03:43.578358 kubelet[1597]: I1213 02:03:43.578283 1597 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 02:03:43.578536 kubelet[1597]: I1213 02:03:43.578522 1597 server.go:929] "Client rotation is on, will bootstrap in background" Dec 13 02:03:43.595961 kubelet[1597]: E1213 02:03:43.595891 1597 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.0.0.95:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.0.0.95:6443: connect: connection refused" logger="UnhandledError" Dec 13 02:03:43.596141 kubelet[1597]: I1213 02:03:43.596121 1597 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 02:03:43.601852 kubelet[1597]: E1213 02:03:43.601791 1597 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Dec 13 02:03:43.601852 kubelet[1597]: I1213 02:03:43.601830 1597 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Dec 13 02:03:43.606695 kubelet[1597]: I1213 02:03:43.606668 1597 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 02:03:43.606782 kubelet[1597]: I1213 02:03:43.606759 1597 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Dec 13 02:03:43.606913 kubelet[1597]: I1213 02:03:43.606877 1597 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 02:03:43.607072 kubelet[1597]: I1213 02:03:43.606907 1597 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Dec 13 02:03:43.607172 kubelet[1597]: I1213 02:03:43.607075 1597 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 02:03:43.607172 kubelet[1597]: I1213 02:03:43.607084 1597 container_manager_linux.go:300] "Creating device plugin manager" Dec 13 02:03:43.607236 kubelet[1597]: I1213 02:03:43.607208 1597 state_mem.go:36] "Initialized new in-memory state store" Dec 13 02:03:43.610332 kubelet[1597]: I1213 02:03:43.610307 1597 kubelet.go:408] "Attempting to sync node with API server" Dec 13 02:03:43.610332 kubelet[1597]: I1213 02:03:43.610333 1597 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 02:03:43.613134 kubelet[1597]: I1213 02:03:43.613104 1597 kubelet.go:314] "Adding apiserver pod source" Dec 13 02:03:43.613134 kubelet[1597]: I1213 02:03:43.613130 1597 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 02:03:43.631476 kubelet[1597]: W1213 02:03:43.631403 1597 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.95:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.95:6443: connect: connection refused Dec 13 02:03:43.631476 kubelet[1597]: W1213 02:03:43.631398 1597 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.95:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.95:6443: connect: connection refused Dec 13 02:03:43.631476 kubelet[1597]: E1213 02:03:43.631474 1597 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.95:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.95:6443: connect: connection refused" logger="UnhandledError" Dec 13 02:03:43.631476 kubelet[1597]: E1213 02:03:43.631474 1597 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.95:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.95:6443: connect: connection refused" logger="UnhandledError" Dec 13 02:03:43.637273 kubelet[1597]: I1213 02:03:43.637231 1597 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 02:03:43.641417 kubelet[1597]: I1213 02:03:43.641384 1597 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 02:03:43.641491 kubelet[1597]: W1213 02:03:43.641477 1597 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 02:03:43.642231 kubelet[1597]: I1213 02:03:43.642203 1597 server.go:1269] "Started kubelet" Dec 13 02:03:43.643248 kubelet[1597]: I1213 02:03:43.642666 1597 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 02:03:43.643248 kubelet[1597]: I1213 02:03:43.643003 1597 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 02:03:43.643248 kubelet[1597]: I1213 02:03:43.643061 1597 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 02:03:43.642000 audit[1597]: AVC avc: denied { mac_admin } for pid=1597 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.642000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:03:43.642000 audit[1597]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b60f60 a1=c000bfa0c0 a2=c000b60f30 a3=25 items=0 ppid=1 pid=1597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:43.642000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:03:43.642000 audit[1597]: AVC avc: denied { mac_admin } for pid=1597 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.642000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:03:43.642000 audit[1597]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c16880 a1=c000bfa0d8 a2=c000b60ff0 a3=25 items=0 ppid=1 pid=1597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:43.642000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:03:43.644356 kubelet[1597]: I1213 02:03:43.643898 1597 server.go:460] "Adding debug handlers to kubelet server" Dec 13 02:03:43.644356 kubelet[1597]: I1213 02:03:43.643913 1597 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 02:03:43.644356 kubelet[1597]: I1213 02:03:43.643962 1597 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 02:03:43.644356 kubelet[1597]: I1213 02:03:43.644044 1597 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 02:03:43.645216 kubelet[1597]: I1213 02:03:43.645024 1597 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Dec 13 02:03:43.645000 audit[1609]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1609 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:43.645000 audit[1609]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcc0d65950 a2=0 a3=7ffcc0d6593c items=0 ppid=1597 pid=1609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:43.645000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 02:03:43.647174 kubelet[1597]: I1213 02:03:43.646688 1597 volume_manager.go:289] "Starting Kubelet Volume Manager" Dec 13 02:03:43.647174 kubelet[1597]: I1213 02:03:43.646777 1597 desired_state_of_world_populator.go:146] "Desired state populator starts to run" Dec 13 02:03:43.647174 kubelet[1597]: I1213 02:03:43.646826 1597 reconciler.go:26] "Reconciler: start to sync state" Dec 13 02:03:43.647174 kubelet[1597]: W1213 02:03:43.647068 1597 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.95:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.95:6443: connect: connection refused Dec 13 02:03:43.647174 kubelet[1597]: E1213 02:03:43.647104 1597 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.95:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.95:6443: connect: connection refused" logger="UnhandledError" Dec 13 02:03:43.647444 kubelet[1597]: I1213 02:03:43.647393 1597 factory.go:221] Registration of the systemd container factory successfully Dec 13 02:03:43.647499 kubelet[1597]: I1213 02:03:43.647488 1597 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 02:03:43.648140 kubelet[1597]: E1213 02:03:43.647625 1597 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 02:03:43.648140 kubelet[1597]: E1213 02:03:43.647883 1597 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 02:03:43.648140 kubelet[1597]: E1213 02:03:43.647973 1597 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.95:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.95:6443: connect: connection refused" interval="200ms" Dec 13 02:03:43.647000 audit[1610]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1610 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:43.647000 audit[1610]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdb4c1b270 a2=0 a3=7ffdb4c1b25c items=0 ppid=1597 pid=1610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:43.647000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 02:03:43.648481 kubelet[1597]: I1213 02:03:43.648447 1597 factory.go:221] Registration of the containerd container factory successfully Dec 13 02:03:43.648000 audit[1612]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1612 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:43.648000 audit[1612]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcc7f80f10 a2=0 a3=7ffcc7f80efc items=0 ppid=1597 pid=1612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:43.648000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:03:43.651286 kubelet[1597]: E1213 02:03:43.650306 1597 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.95:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.95:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.18109a386b07b842 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2024-12-13 02:03:43.642155074 +0000 UTC m=+0.389439661,LastTimestamp:2024-12-13 02:03:43.642155074 +0000 UTC m=+0.389439661,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" Dec 13 02:03:43.650000 audit[1614]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1614 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:43.650000 audit[1614]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd15247c90 a2=0 a3=7ffd15247c7c items=0 ppid=1597 pid=1614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:43.650000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:03:43.657000 audit[1618]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1618 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:43.657000 audit[1618]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffcdc3d5850 a2=0 a3=7ffcdc3d583c items=0 ppid=1597 pid=1618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:43.657000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 02:03:43.658789 kubelet[1597]: I1213 02:03:43.658731 1597 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 02:03:43.658000 audit[1620]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1620 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:43.658000 audit[1620]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe65381690 a2=0 a3=7ffe6538167c items=0 ppid=1597 pid=1620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:43.658000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 02:03:43.659773 kubelet[1597]: I1213 02:03:43.659660 1597 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 02:03:43.659773 kubelet[1597]: I1213 02:03:43.659685 1597 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 02:03:43.659773 kubelet[1597]: I1213 02:03:43.659704 1597 kubelet.go:2321] "Starting kubelet main sync loop" Dec 13 02:03:43.659773 kubelet[1597]: E1213 02:03:43.659740 1597 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 02:03:43.659000 audit[1622]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1622 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:43.659000 audit[1622]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffed54b9340 a2=0 a3=7ffed54b932c items=0 ppid=1597 pid=1622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:43.659000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 02:03:43.660000 audit[1623]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1623 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:43.660000 audit[1623]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcd9382670 a2=0 a3=7ffcd938265c items=0 ppid=1597 pid=1623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:43.660000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 02:03:43.660000 audit[1624]: NETFILTER_CFG table=mangle:34 family=10 entries=1 op=nft_register_chain pid=1624 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:43.660000 audit[1624]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd724a8950 a2=0 a3=7ffd724a893c items=0 ppid=1597 pid=1624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:43.660000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 02:03:43.661000 audit[1625]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=1625 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:43.661000 audit[1625]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd001e64f0 a2=0 a3=7ffd001e64dc items=0 ppid=1597 pid=1625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:43.661000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 02:03:43.661000 audit[1626]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1626 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:43.661000 audit[1626]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffdcdbfbb00 a2=0 a3=7ffdcdbfbaec items=0 ppid=1597 pid=1626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:43.661000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 02:03:43.663477 kubelet[1597]: W1213 02:03:43.663414 1597 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.95:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.95:6443: connect: connection refused Dec 13 02:03:43.663532 kubelet[1597]: E1213 02:03:43.663484 1597 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.95:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.95:6443: connect: connection refused" logger="UnhandledError" Dec 13 02:03:43.662000 audit[1627]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1627 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:43.662000 audit[1627]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff556c9130 a2=0 a3=7fff556c911c items=0 ppid=1597 pid=1627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:43.662000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 02:03:43.664333 kubelet[1597]: I1213 02:03:43.664176 1597 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 02:03:43.664333 kubelet[1597]: I1213 02:03:43.664185 1597 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 02:03:43.664333 kubelet[1597]: I1213 02:03:43.664249 1597 state_mem.go:36] "Initialized new in-memory state store" Dec 13 02:03:43.748374 kubelet[1597]: E1213 02:03:43.748320 1597 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 02:03:43.760522 kubelet[1597]: E1213 02:03:43.760491 1597 kubelet.go:2345] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Dec 13 02:03:43.848648 kubelet[1597]: E1213 02:03:43.848506 1597 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 02:03:43.848888 kubelet[1597]: E1213 02:03:43.848853 1597 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.95:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.95:6443: connect: connection refused" interval="400ms" Dec 13 02:03:43.936903 kubelet[1597]: I1213 02:03:43.936801 1597 policy_none.go:49] "None policy: Start" Dec 13 02:03:43.937763 kubelet[1597]: I1213 02:03:43.937729 1597 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 02:03:43.937818 kubelet[1597]: I1213 02:03:43.937767 1597 state_mem.go:35] "Initializing new in-memory state store" Dec 13 02:03:43.948943 kubelet[1597]: E1213 02:03:43.948917 1597 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 02:03:43.949703 systemd[1]: Created slice kubepods.slice. Dec 13 02:03:43.954074 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 02:03:43.957013 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 02:03:43.960613 kubelet[1597]: E1213 02:03:43.960573 1597 kubelet.go:2345] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Dec 13 02:03:43.963000 audit[1597]: AVC avc: denied { mac_admin } for pid=1597 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:43.963000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:03:43.963000 audit[1597]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000f1d260 a1=c000f3a528 a2=c000f1d230 a3=25 items=0 ppid=1 pid=1597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:43.963000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:03:43.964676 kubelet[1597]: I1213 02:03:43.963729 1597 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 02:03:43.964676 kubelet[1597]: I1213 02:03:43.963780 1597 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 02:03:43.964676 kubelet[1597]: I1213 02:03:43.963888 1597 eviction_manager.go:189] "Eviction manager: starting control loop" Dec 13 02:03:43.964676 kubelet[1597]: I1213 02:03:43.963896 1597 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 02:03:43.964676 kubelet[1597]: I1213 02:03:43.964086 1597 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 02:03:43.965297 kubelet[1597]: E1213 02:03:43.965269 1597 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" Dec 13 02:03:44.066085 kubelet[1597]: I1213 02:03:44.066040 1597 kubelet_node_status.go:72] "Attempting to register node" node="localhost" Dec 13 02:03:44.066494 kubelet[1597]: E1213 02:03:44.066445 1597 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.95:6443/api/v1/nodes\": dial tcp 10.0.0.95:6443: connect: connection refused" node="localhost" Dec 13 02:03:44.250118 kubelet[1597]: E1213 02:03:44.250056 1597 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.95:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.95:6443: connect: connection refused" interval="800ms" Dec 13 02:03:44.268197 kubelet[1597]: I1213 02:03:44.268145 1597 kubelet_node_status.go:72] "Attempting to register node" node="localhost" Dec 13 02:03:44.268452 kubelet[1597]: E1213 02:03:44.268414 1597 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.95:6443/api/v1/nodes\": dial tcp 10.0.0.95:6443: connect: connection refused" node="localhost" Dec 13 02:03:44.367639 systemd[1]: Created slice kubepods-burstable-pod50a9ae38ddb3bec3278d8dc73a6a7009.slice. Dec 13 02:03:44.379487 systemd[1]: Created slice kubepods-burstable-poda52b86ce975f496e6002ba953fa9b888.slice. Dec 13 02:03:44.391960 systemd[1]: Created slice kubepods-burstable-pod308d3a5f9fd6a80d985501a1200097a4.slice. Dec 13 02:03:44.449814 kubelet[1597]: I1213 02:03:44.449760 1597 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 02:03:44.449814 kubelet[1597]: I1213 02:03:44.449807 1597 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 02:03:44.450176 kubelet[1597]: I1213 02:03:44.449837 1597 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/308d3a5f9fd6a80d985501a1200097a4-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"308d3a5f9fd6a80d985501a1200097a4\") " pod="kube-system/kube-apiserver-localhost" Dec 13 02:03:44.450176 kubelet[1597]: I1213 02:03:44.449875 1597 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 02:03:44.450176 kubelet[1597]: I1213 02:03:44.449984 1597 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 02:03:44.450176 kubelet[1597]: I1213 02:03:44.450029 1597 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a52b86ce975f496e6002ba953fa9b888-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"a52b86ce975f496e6002ba953fa9b888\") " pod="kube-system/kube-scheduler-localhost" Dec 13 02:03:44.450176 kubelet[1597]: I1213 02:03:44.450052 1597 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/308d3a5f9fd6a80d985501a1200097a4-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"308d3a5f9fd6a80d985501a1200097a4\") " pod="kube-system/kube-apiserver-localhost" Dec 13 02:03:44.450336 kubelet[1597]: I1213 02:03:44.450087 1597 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/308d3a5f9fd6a80d985501a1200097a4-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"308d3a5f9fd6a80d985501a1200097a4\") " pod="kube-system/kube-apiserver-localhost" Dec 13 02:03:44.450336 kubelet[1597]: I1213 02:03:44.450151 1597 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 02:03:44.670438 kubelet[1597]: I1213 02:03:44.670298 1597 kubelet_node_status.go:72] "Attempting to register node" node="localhost" Dec 13 02:03:44.670684 kubelet[1597]: E1213 02:03:44.670655 1597 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.95:6443/api/v1/nodes\": dial tcp 10.0.0.95:6443: connect: connection refused" node="localhost" Dec 13 02:03:44.678939 kubelet[1597]: E1213 02:03:44.678910 1597 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:44.679555 env[1201]: time="2024-12-13T02:03:44.679513675Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:50a9ae38ddb3bec3278d8dc73a6a7009,Namespace:kube-system,Attempt:0,}" Dec 13 02:03:44.690884 kubelet[1597]: E1213 02:03:44.690814 1597 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:44.691458 env[1201]: time="2024-12-13T02:03:44.691417973Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:a52b86ce975f496e6002ba953fa9b888,Namespace:kube-system,Attempt:0,}" Dec 13 02:03:44.694588 kubelet[1597]: E1213 02:03:44.694567 1597 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:44.694986 env[1201]: time="2024-12-13T02:03:44.694944268Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:308d3a5f9fd6a80d985501a1200097a4,Namespace:kube-system,Attempt:0,}" Dec 13 02:03:44.786933 kubelet[1597]: W1213 02:03:44.786857 1597 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.95:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.95:6443: connect: connection refused Dec 13 02:03:44.786933 kubelet[1597]: E1213 02:03:44.786921 1597 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.95:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.95:6443: connect: connection refused" logger="UnhandledError" Dec 13 02:03:44.994955 kubelet[1597]: W1213 02:03:44.994874 1597 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.95:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.95:6443: connect: connection refused Dec 13 02:03:44.994955 kubelet[1597]: E1213 02:03:44.994952 1597 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.95:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.95:6443: connect: connection refused" logger="UnhandledError" Dec 13 02:03:45.051039 kubelet[1597]: E1213 02:03:45.050975 1597 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.95:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.95:6443: connect: connection refused" interval="1.6s" Dec 13 02:03:45.132948 kubelet[1597]: W1213 02:03:45.132865 1597 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.95:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.95:6443: connect: connection refused Dec 13 02:03:45.132948 kubelet[1597]: E1213 02:03:45.132935 1597 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.95:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.95:6443: connect: connection refused" logger="UnhandledError" Dec 13 02:03:45.226768 kubelet[1597]: W1213 02:03:45.226659 1597 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.95:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.95:6443: connect: connection refused Dec 13 02:03:45.226768 kubelet[1597]: E1213 02:03:45.226751 1597 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.95:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.95:6443: connect: connection refused" logger="UnhandledError" Dec 13 02:03:45.472802 kubelet[1597]: I1213 02:03:45.472725 1597 kubelet_node_status.go:72] "Attempting to register node" node="localhost" Dec 13 02:03:45.473225 kubelet[1597]: E1213 02:03:45.473148 1597 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.95:6443/api/v1/nodes\": dial tcp 10.0.0.95:6443: connect: connection refused" node="localhost" Dec 13 02:03:45.548591 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3979386403.mount: Deactivated successfully. Dec 13 02:03:45.557125 env[1201]: time="2024-12-13T02:03:45.557046030Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:45.561461 env[1201]: time="2024-12-13T02:03:45.561396354Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:45.563217 env[1201]: time="2024-12-13T02:03:45.563158386Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:45.564317 env[1201]: time="2024-12-13T02:03:45.564244806Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:45.566240 env[1201]: time="2024-12-13T02:03:45.566180365Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:45.567728 env[1201]: time="2024-12-13T02:03:45.567693456Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:45.569307 env[1201]: time="2024-12-13T02:03:45.569273619Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:45.573128 env[1201]: time="2024-12-13T02:03:45.573077393Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:45.574361 env[1201]: time="2024-12-13T02:03:45.574319024Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:45.575990 env[1201]: time="2024-12-13T02:03:45.575943511Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:45.577440 env[1201]: time="2024-12-13T02:03:45.577405901Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:45.581957 env[1201]: time="2024-12-13T02:03:45.581904587Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:03:45.611305 env[1201]: time="2024-12-13T02:03:45.611177903Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:03:45.611460 env[1201]: time="2024-12-13T02:03:45.611278382Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:03:45.611460 env[1201]: time="2024-12-13T02:03:45.611292779Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:03:45.612221 env[1201]: time="2024-12-13T02:03:45.612076951Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fc06cc28a8f6eb5d9f780908cd66994ad84ee9517068a018b126fae4be9ed129 pid=1638 runtime=io.containerd.runc.v2 Dec 13 02:03:45.615333 env[1201]: time="2024-12-13T02:03:45.615276217Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:03:45.615436 env[1201]: time="2024-12-13T02:03:45.615410413Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:03:45.615563 env[1201]: time="2024-12-13T02:03:45.615538643Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:03:45.619705 env[1201]: time="2024-12-13T02:03:45.619524608Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b69de9ca01dd05b08f3d6ea0031cb747242aec28c99cf2a7974b24515e7d3c2e pid=1653 runtime=io.containerd.runc.v2 Dec 13 02:03:45.621836 env[1201]: time="2024-12-13T02:03:45.621692868Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:03:45.622015 env[1201]: time="2024-12-13T02:03:45.621981511Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:03:45.622123 env[1201]: time="2024-12-13T02:03:45.622099215Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:03:45.622726 env[1201]: time="2024-12-13T02:03:45.622664301Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e3271ce1e6c568b71e42d6beafc1b8ca46bc447ae8615f07d165b176a47ca8e4 pid=1673 runtime=io.containerd.runc.v2 Dec 13 02:03:45.629054 systemd[1]: Started cri-containerd-fc06cc28a8f6eb5d9f780908cd66994ad84ee9517068a018b126fae4be9ed129.scope. Dec 13 02:03:45.639034 systemd[1]: Started cri-containerd-b69de9ca01dd05b08f3d6ea0031cb747242aec28c99cf2a7974b24515e7d3c2e.scope. Dec 13 02:03:45.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.642000 audit: BPF prog-id=61 op=LOAD Dec 13 02:03:45.643000 audit[1655]: AVC avc: denied { bpf } for pid=1655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.643000 audit[1655]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1638 pid=1655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:45.643000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663303663633238613866366562356439663738303930386364363639 Dec 13 02:03:45.643000 audit[1655]: AVC avc: denied { perfmon } for pid=1655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.643000 audit[1655]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1638 pid=1655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:45.643000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663303663633238613866366562356439663738303930386364363639 Dec 13 02:03:45.643000 audit[1655]: AVC avc: denied { bpf } for pid=1655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.643000 audit[1655]: AVC avc: denied { bpf } for pid=1655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.643000 audit[1655]: AVC avc: denied { bpf } for pid=1655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.643000 audit[1655]: AVC avc: denied { perfmon } for pid=1655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.643000 audit[1655]: AVC avc: denied { perfmon } for pid=1655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.643000 audit[1655]: AVC avc: denied { perfmon } for pid=1655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.643000 audit[1655]: AVC avc: denied { perfmon } for pid=1655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.643000 audit[1655]: AVC avc: denied { perfmon } for pid=1655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.643000 audit[1655]: AVC avc: denied { bpf } for pid=1655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.643000 audit[1655]: AVC avc: denied { bpf } for pid=1655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.643000 audit: BPF prog-id=62 op=LOAD Dec 13 02:03:45.643000 audit[1655]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00035e850 items=0 ppid=1638 pid=1655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:45.643000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663303663633238613866366562356439663738303930386364363639 Dec 13 02:03:45.643000 audit[1655]: AVC avc: denied { bpf } for pid=1655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.643000 audit[1655]: AVC avc: denied { bpf } for pid=1655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.643000 audit[1655]: AVC avc: denied { perfmon } for pid=1655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.643000 audit[1655]: AVC avc: denied { perfmon } for pid=1655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.643000 audit[1655]: AVC avc: denied { perfmon } for pid=1655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.643000 audit[1655]: AVC avc: denied { perfmon } for pid=1655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.643000 audit[1655]: AVC avc: denied { perfmon } for pid=1655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.643000 audit[1655]: AVC avc: denied { bpf } for pid=1655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.643000 audit[1655]: AVC avc: denied { bpf } for pid=1655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.643000 audit: BPF prog-id=63 op=LOAD Dec 13 02:03:45.643000 audit[1655]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00035e898 items=0 ppid=1638 pid=1655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:45.643000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663303663633238613866366562356439663738303930386364363639 Dec 13 02:03:45.643000 audit: BPF prog-id=63 op=UNLOAD Dec 13 02:03:45.643000 audit: BPF prog-id=62 op=UNLOAD Dec 13 02:03:45.643000 audit[1655]: AVC avc: denied { bpf } for pid=1655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.643000 audit[1655]: AVC avc: denied { bpf } for pid=1655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.643000 audit[1655]: AVC avc: denied { bpf } for pid=1655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.643000 audit[1655]: AVC avc: denied { perfmon } for pid=1655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.643000 audit[1655]: AVC avc: denied { perfmon } for pid=1655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.643000 audit[1655]: AVC avc: denied { perfmon } for pid=1655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.643000 audit[1655]: AVC avc: denied { perfmon } for pid=1655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.643000 audit[1655]: AVC avc: denied { perfmon } for pid=1655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.643000 audit[1655]: AVC avc: denied { bpf } for pid=1655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.643000 audit[1655]: AVC avc: denied { bpf } for pid=1655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.643000 audit: BPF prog-id=64 op=LOAD Dec 13 02:03:45.643000 audit[1655]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00035eca8 items=0 ppid=1638 pid=1655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:45.643000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663303663633238613866366562356439663738303930386364363639 Dec 13 02:03:45.649751 systemd[1]: Started cri-containerd-e3271ce1e6c568b71e42d6beafc1b8ca46bc447ae8615f07d165b176a47ca8e4.scope. Dec 13 02:03:45.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.652000 audit: BPF prog-id=65 op=LOAD Dec 13 02:03:45.653000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.653000 audit[1688]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1653 pid=1688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:45.653000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236396465396361303164643035623038663364366561303033316362 Dec 13 02:03:45.653000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.653000 audit[1688]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1653 pid=1688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:45.653000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236396465396361303164643035623038663364366561303033316362 Dec 13 02:03:45.653000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.653000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.653000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.653000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.653000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.653000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.653000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.653000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.653000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.653000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.653000 audit: BPF prog-id=66 op=LOAD Dec 13 02:03:45.653000 audit[1688]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00028b4b0 items=0 ppid=1653 pid=1688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:45.653000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236396465396361303164643035623038663364366561303033316362 Dec 13 02:03:45.654000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.654000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.654000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.654000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.654000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.654000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.654000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.654000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.654000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.654000 audit: BPF prog-id=67 op=LOAD Dec 13 02:03:45.654000 audit[1688]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00028b4f8 items=0 ppid=1653 pid=1688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:45.654000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236396465396361303164643035623038663364366561303033316362 Dec 13 02:03:45.655000 audit: BPF prog-id=67 op=UNLOAD Dec 13 02:03:45.655000 audit: BPF prog-id=66 op=UNLOAD Dec 13 02:03:45.655000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.655000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.655000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.655000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.655000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.655000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.655000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.655000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.655000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.655000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.655000 audit: BPF prog-id=68 op=LOAD Dec 13 02:03:45.655000 audit[1688]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00028b908 items=0 ppid=1653 pid=1688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:45.655000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236396465396361303164643035623038663364366561303033316362 Dec 13 02:03:45.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.660000 audit: BPF prog-id=69 op=LOAD Dec 13 02:03:45.661230 kubelet[1597]: E1213 02:03:45.659599 1597 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.0.0.95:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.0.0.95:6443: connect: connection refused" logger="UnhandledError" Dec 13 02:03:45.661000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.661000 audit[1692]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1673 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:45.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533323731636531653663353638623731653432643662656166633162 Dec 13 02:03:45.661000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.661000 audit[1692]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1673 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:45.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533323731636531653663353638623731653432643662656166633162 Dec 13 02:03:45.661000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.661000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.661000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.661000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.661000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.661000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.661000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.661000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.661000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.661000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.661000 audit: BPF prog-id=70 op=LOAD Dec 13 02:03:45.661000 audit[1692]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00035f060 items=0 ppid=1673 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:45.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533323731636531653663353638623731653432643662656166633162 Dec 13 02:03:45.661000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.661000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.661000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.661000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.661000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.661000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.661000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.661000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.661000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.661000 audit: BPF prog-id=71 op=LOAD Dec 13 02:03:45.661000 audit[1692]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00035f0a8 items=0 ppid=1673 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:45.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533323731636531653663353638623731653432643662656166633162 Dec 13 02:03:45.661000 audit: BPF prog-id=71 op=UNLOAD Dec 13 02:03:45.661000 audit: BPF prog-id=70 op=UNLOAD Dec 13 02:03:45.662000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.662000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.662000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.662000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.662000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.662000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.662000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.662000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.662000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.662000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.662000 audit: BPF prog-id=72 op=LOAD Dec 13 02:03:45.662000 audit[1692]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00035f4b8 items=0 ppid=1673 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:45.662000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533323731636531653663353638623731653432643662656166633162 Dec 13 02:03:45.675256 env[1201]: time="2024-12-13T02:03:45.675160839Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:308d3a5f9fd6a80d985501a1200097a4,Namespace:kube-system,Attempt:0,} returns sandbox id \"fc06cc28a8f6eb5d9f780908cd66994ad84ee9517068a018b126fae4be9ed129\"" Dec 13 02:03:45.676560 kubelet[1597]: E1213 02:03:45.676276 1597 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:45.679593 env[1201]: time="2024-12-13T02:03:45.679546915Z" level=info msg="CreateContainer within sandbox \"fc06cc28a8f6eb5d9f780908cd66994ad84ee9517068a018b126fae4be9ed129\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Dec 13 02:03:45.687892 env[1201]: time="2024-12-13T02:03:45.687826708Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:50a9ae38ddb3bec3278d8dc73a6a7009,Namespace:kube-system,Attempt:0,} returns sandbox id \"e3271ce1e6c568b71e42d6beafc1b8ca46bc447ae8615f07d165b176a47ca8e4\"" Dec 13 02:03:45.688897 env[1201]: time="2024-12-13T02:03:45.688854777Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:a52b86ce975f496e6002ba953fa9b888,Namespace:kube-system,Attempt:0,} returns sandbox id \"b69de9ca01dd05b08f3d6ea0031cb747242aec28c99cf2a7974b24515e7d3c2e\"" Dec 13 02:03:45.689823 kubelet[1597]: E1213 02:03:45.689795 1597 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:45.691329 kubelet[1597]: E1213 02:03:45.691312 1597 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:45.691718 env[1201]: time="2024-12-13T02:03:45.691683348Z" level=info msg="CreateContainer within sandbox \"b69de9ca01dd05b08f3d6ea0031cb747242aec28c99cf2a7974b24515e7d3c2e\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Dec 13 02:03:45.693609 env[1201]: time="2024-12-13T02:03:45.693577501Z" level=info msg="CreateContainer within sandbox \"e3271ce1e6c568b71e42d6beafc1b8ca46bc447ae8615f07d165b176a47ca8e4\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Dec 13 02:03:45.710073 env[1201]: time="2024-12-13T02:03:45.710007221Z" level=info msg="CreateContainer within sandbox \"fc06cc28a8f6eb5d9f780908cd66994ad84ee9517068a018b126fae4be9ed129\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"dc6684ddff986c33cdd9336876abec06e2d7f2c22054062e36e079127ee86c54\"" Dec 13 02:03:45.710981 env[1201]: time="2024-12-13T02:03:45.710932937Z" level=info msg="StartContainer for \"dc6684ddff986c33cdd9336876abec06e2d7f2c22054062e36e079127ee86c54\"" Dec 13 02:03:45.721770 env[1201]: time="2024-12-13T02:03:45.721709205Z" level=info msg="CreateContainer within sandbox \"b69de9ca01dd05b08f3d6ea0031cb747242aec28c99cf2a7974b24515e7d3c2e\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"28deb89514b311eae11b6af7d21ddcf74455ab16485bd5b4635eaf837ce724ef\"" Dec 13 02:03:45.722902 env[1201]: time="2024-12-13T02:03:45.722793911Z" level=info msg="StartContainer for \"28deb89514b311eae11b6af7d21ddcf74455ab16485bd5b4635eaf837ce724ef\"" Dec 13 02:03:45.726524 env[1201]: time="2024-12-13T02:03:45.726443157Z" level=info msg="CreateContainer within sandbox \"e3271ce1e6c568b71e42d6beafc1b8ca46bc447ae8615f07d165b176a47ca8e4\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"af9230c958b90d4cb5f060557d04976635dde204c4a63489e941a0685d513c0c\"" Dec 13 02:03:45.727220 env[1201]: time="2024-12-13T02:03:45.727167484Z" level=info msg="StartContainer for \"af9230c958b90d4cb5f060557d04976635dde204c4a63489e941a0685d513c0c\"" Dec 13 02:03:45.730240 systemd[1]: Started cri-containerd-dc6684ddff986c33cdd9336876abec06e2d7f2c22054062e36e079127ee86c54.scope. Dec 13 02:03:45.745725 systemd[1]: Started cri-containerd-28deb89514b311eae11b6af7d21ddcf74455ab16485bd5b4635eaf837ce724ef.scope. Dec 13 02:03:45.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.748000 audit: BPF prog-id=73 op=LOAD Dec 13 02:03:45.749000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.749000 audit[1758]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000199c48 a2=10 a3=1c items=0 ppid=1638 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:45.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463363638346464666639383663333363646439333336383736616265 Dec 13 02:03:45.749000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.749000 audit[1758]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001996b0 a2=3c a3=8 items=0 ppid=1638 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:45.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463363638346464666639383663333363646439333336383736616265 Dec 13 02:03:45.749000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.749000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.749000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.749000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.749000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.749000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.749000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.749000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.749000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.749000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.749000 audit: BPF prog-id=74 op=LOAD Dec 13 02:03:45.749000 audit[1758]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001999d8 a2=78 a3=c000380f20 items=0 ppid=1638 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:45.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463363638346464666639383663333363646439333336383736616265 Dec 13 02:03:45.749000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.749000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.749000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.749000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.749000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.749000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.749000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.749000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.749000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.749000 audit: BPF prog-id=75 op=LOAD Dec 13 02:03:45.749000 audit[1758]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000199770 a2=78 a3=c000380f68 items=0 ppid=1638 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:45.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463363638346464666639383663333363646439333336383736616265 Dec 13 02:03:45.750000 audit: BPF prog-id=75 op=UNLOAD Dec 13 02:03:45.750000 audit: BPF prog-id=74 op=UNLOAD Dec 13 02:03:45.750000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.750000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.750000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.750000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.750000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.750000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.750000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.750000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.750000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.750000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.750000 audit: BPF prog-id=76 op=LOAD Dec 13 02:03:45.750000 audit[1758]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000199c30 a2=78 a3=c000381378 items=0 ppid=1638 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:45.750000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463363638346464666639383663333363646439333336383736616265 Dec 13 02:03:45.754757 systemd[1]: Started cri-containerd-af9230c958b90d4cb5f060557d04976635dde204c4a63489e941a0685d513c0c.scope. Dec 13 02:03:45.757000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.757000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.757000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.757000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.757000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.757000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.757000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.757000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.757000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.758000 audit: BPF prog-id=77 op=LOAD Dec 13 02:03:45.759000 audit[1780]: AVC avc: denied { bpf } for pid=1780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.759000 audit[1780]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1653 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:45.759000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238646562383935313462333131656165313162366166376432316464 Dec 13 02:03:45.759000 audit[1780]: AVC avc: denied { perfmon } for pid=1780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.759000 audit[1780]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1653 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:45.759000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238646562383935313462333131656165313162366166376432316464 Dec 13 02:03:45.759000 audit[1780]: AVC avc: denied { bpf } for pid=1780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.759000 audit[1780]: AVC avc: denied { bpf } for pid=1780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.759000 audit[1780]: AVC avc: denied { bpf } for pid=1780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.759000 audit[1780]: AVC avc: denied { perfmon } for pid=1780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.759000 audit[1780]: AVC avc: denied { perfmon } for pid=1780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.759000 audit[1780]: AVC avc: denied { perfmon } for pid=1780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.759000 audit[1780]: AVC avc: denied { perfmon } for pid=1780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.759000 audit[1780]: AVC avc: denied { perfmon } for pid=1780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.759000 audit[1780]: AVC avc: denied { bpf } for pid=1780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.759000 audit[1780]: AVC avc: denied { bpf } for pid=1780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.759000 audit: BPF prog-id=78 op=LOAD Dec 13 02:03:45.759000 audit[1780]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000e9d10 items=0 ppid=1653 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:45.759000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238646562383935313462333131656165313162366166376432316464 Dec 13 02:03:45.759000 audit[1780]: AVC avc: denied { bpf } for pid=1780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.759000 audit[1780]: AVC avc: denied { bpf } for pid=1780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.759000 audit[1780]: AVC avc: denied { perfmon } for pid=1780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.759000 audit[1780]: AVC avc: denied { perfmon } for pid=1780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.759000 audit[1780]: AVC avc: denied { perfmon } for pid=1780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.759000 audit[1780]: AVC avc: denied { perfmon } for pid=1780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.759000 audit[1780]: AVC avc: denied { perfmon } for pid=1780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.759000 audit[1780]: AVC avc: denied { bpf } for pid=1780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.759000 audit[1780]: AVC avc: denied { bpf } for pid=1780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.759000 audit: BPF prog-id=79 op=LOAD Dec 13 02:03:45.759000 audit[1780]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000e9d58 items=0 ppid=1653 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:45.759000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238646562383935313462333131656165313162366166376432316464 Dec 13 02:03:45.759000 audit: BPF prog-id=79 op=UNLOAD Dec 13 02:03:45.759000 audit: BPF prog-id=78 op=UNLOAD Dec 13 02:03:45.759000 audit[1780]: AVC avc: denied { bpf } for pid=1780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.759000 audit[1780]: AVC avc: denied { bpf } for pid=1780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.759000 audit[1780]: AVC avc: denied { bpf } for pid=1780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.759000 audit[1780]: AVC avc: denied { perfmon } for pid=1780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.759000 audit[1780]: AVC avc: denied { perfmon } for pid=1780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.759000 audit[1780]: AVC avc: denied { perfmon } for pid=1780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.759000 audit[1780]: AVC avc: denied { perfmon } for pid=1780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.759000 audit[1780]: AVC avc: denied { perfmon } for pid=1780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.759000 audit[1780]: AVC avc: denied { bpf } for pid=1780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.759000 audit[1780]: AVC avc: denied { bpf } for pid=1780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.759000 audit: BPF prog-id=80 op=LOAD Dec 13 02:03:45.759000 audit[1780]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000364168 items=0 ppid=1653 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:45.759000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238646562383935313462333131656165313162366166376432316464 Dec 13 02:03:45.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.772000 audit: BPF prog-id=81 op=LOAD Dec 13 02:03:45.772000 audit[1793]: AVC avc: denied { bpf } for pid=1793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.772000 audit[1793]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=1673 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:45.772000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166393233306339353862393064346362356630363035353764303439 Dec 13 02:03:45.772000 audit[1793]: AVC avc: denied { perfmon } for pid=1793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.772000 audit[1793]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=1673 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:45.772000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166393233306339353862393064346362356630363035353764303439 Dec 13 02:03:45.772000 audit[1793]: AVC avc: denied { bpf } for pid=1793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.772000 audit[1793]: AVC avc: denied { bpf } for pid=1793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.772000 audit[1793]: AVC avc: denied { bpf } for pid=1793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.772000 audit[1793]: AVC avc: denied { perfmon } for pid=1793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.772000 audit[1793]: AVC avc: denied { perfmon } for pid=1793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.772000 audit[1793]: AVC avc: denied { perfmon } for pid=1793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.772000 audit[1793]: AVC avc: denied { perfmon } for pid=1793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.772000 audit[1793]: AVC avc: denied { perfmon } for pid=1793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.772000 audit[1793]: AVC avc: denied { bpf } for pid=1793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.772000 audit[1793]: AVC avc: denied { bpf } for pid=1793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.772000 audit: BPF prog-id=82 op=LOAD Dec 13 02:03:45.772000 audit[1793]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00028c550 items=0 ppid=1673 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:45.772000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166393233306339353862393064346362356630363035353764303439 Dec 13 02:03:45.773000 audit[1793]: AVC avc: denied { bpf } for pid=1793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.773000 audit[1793]: AVC avc: denied { bpf } for pid=1793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.773000 audit[1793]: AVC avc: denied { perfmon } for pid=1793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.773000 audit[1793]: AVC avc: denied { perfmon } for pid=1793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.773000 audit[1793]: AVC avc: denied { perfmon } for pid=1793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.773000 audit[1793]: AVC avc: denied { perfmon } for pid=1793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.773000 audit[1793]: AVC avc: denied { perfmon } for pid=1793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.773000 audit[1793]: AVC avc: denied { bpf } for pid=1793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.773000 audit[1793]: AVC avc: denied { bpf } for pid=1793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.773000 audit: BPF prog-id=83 op=LOAD Dec 13 02:03:45.773000 audit[1793]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00028c598 items=0 ppid=1673 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:45.773000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166393233306339353862393064346362356630363035353764303439 Dec 13 02:03:45.773000 audit: BPF prog-id=83 op=UNLOAD Dec 13 02:03:45.773000 audit: BPF prog-id=82 op=UNLOAD Dec 13 02:03:45.773000 audit[1793]: AVC avc: denied { bpf } for pid=1793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.773000 audit[1793]: AVC avc: denied { bpf } for pid=1793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.773000 audit[1793]: AVC avc: denied { bpf } for pid=1793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.773000 audit[1793]: AVC avc: denied { perfmon } for pid=1793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.773000 audit[1793]: AVC avc: denied { perfmon } for pid=1793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.773000 audit[1793]: AVC avc: denied { perfmon } for pid=1793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.773000 audit[1793]: AVC avc: denied { perfmon } for pid=1793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.773000 audit[1793]: AVC avc: denied { perfmon } for pid=1793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.773000 audit[1793]: AVC avc: denied { bpf } for pid=1793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.773000 audit[1793]: AVC avc: denied { bpf } for pid=1793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:45.773000 audit: BPF prog-id=84 op=LOAD Dec 13 02:03:45.773000 audit[1793]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00028c9a8 items=0 ppid=1673 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:45.773000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166393233306339353862393064346362356630363035353764303439 Dec 13 02:03:45.809057 env[1201]: time="2024-12-13T02:03:45.808969412Z" level=info msg="StartContainer for \"dc6684ddff986c33cdd9336876abec06e2d7f2c22054062e36e079127ee86c54\" returns successfully" Dec 13 02:03:45.828377 env[1201]: time="2024-12-13T02:03:45.828293733Z" level=info msg="StartContainer for \"af9230c958b90d4cb5f060557d04976635dde204c4a63489e941a0685d513c0c\" returns successfully" Dec 13 02:03:45.828563 env[1201]: time="2024-12-13T02:03:45.828293803Z" level=info msg="StartContainer for \"28deb89514b311eae11b6af7d21ddcf74455ab16485bd5b4635eaf837ce724ef\" returns successfully" Dec 13 02:03:46.636000 audit[1817]: AVC avc: denied { watch } for pid=1817 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c652,c793 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:03:46.636000 audit[1817]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000906000 a2=fc6 a3=0 items=0 ppid=1673 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c652,c793 key=(null) Dec 13 02:03:46.636000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:03:46.636000 audit[1817]: AVC avc: denied { watch } for pid=1817 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c652,c793 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:03:46.636000 audit[1817]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0003760c0 a2=fc6 a3=0 items=0 ppid=1673 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c652,c793 key=(null) Dec 13 02:03:46.636000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:03:46.670369 kubelet[1597]: E1213 02:03:46.670323 1597 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:46.671772 kubelet[1597]: E1213 02:03:46.671741 1597 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:46.673320 kubelet[1597]: E1213 02:03:46.673293 1597 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:46.952000 audit[1782]: AVC avc: denied { watch } for pid=1782 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c238 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:03:46.952000 audit[1782]: AVC avc: denied { watch } for pid=1782 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c238 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:03:46.952000 audit[1782]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c005f56390 a2=fc6 a3=0 items=0 ppid=1638 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c238 key=(null) Dec 13 02:03:46.952000 audit[1782]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c002181720 a2=fc6 a3=0 items=0 ppid=1638 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c238 key=(null) Dec 13 02:03:46.952000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3935002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 02:03:46.952000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3935002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 02:03:46.953000 audit[1782]: AVC avc: denied { watch } for pid=1782 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c238 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:03:46.953000 audit[1782]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=44 a1=c005f563f0 a2=fc6 a3=0 items=0 ppid=1638 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c238 key=(null) Dec 13 02:03:46.953000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3935002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 02:03:46.953000 audit[1782]: AVC avc: denied { watch } for pid=1782 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c238 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:03:46.953000 audit[1782]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4a a1=c005cfa090 a2=fc6 a3=0 items=0 ppid=1638 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c238 key=(null) Dec 13 02:03:46.953000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3935002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 02:03:46.955000 audit[1782]: AVC avc: denied { watch } for pid=1782 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c238 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:03:46.955000 audit[1782]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c0082a5e20 a2=fc6 a3=0 items=0 ppid=1638 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c238 key=(null) Dec 13 02:03:46.955000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3935002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 02:03:46.956000 audit[1782]: AVC avc: denied { watch } for pid=1782 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c238 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:03:46.956000 audit[1782]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c005cfa300 a2=fc6 a3=0 items=0 ppid=1638 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c238 key=(null) Dec 13 02:03:46.956000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3935002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 02:03:46.986496 kubelet[1597]: E1213 02:03:46.986441 1597 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" Dec 13 02:03:47.075679 kubelet[1597]: I1213 02:03:47.075623 1597 kubelet_node_status.go:72] "Attempting to register node" node="localhost" Dec 13 02:03:47.084739 kubelet[1597]: I1213 02:03:47.084670 1597 kubelet_node_status.go:75] "Successfully registered node" node="localhost" Dec 13 02:03:47.084739 kubelet[1597]: E1213 02:03:47.084722 1597 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"localhost\": node \"localhost\" not found" Dec 13 02:03:47.093859 kubelet[1597]: E1213 02:03:47.093783 1597 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 02:03:47.137708 kubelet[1597]: E1213 02:03:47.137579 1597 event.go:359] "Server rejected event (will not retry!)" err="namespaces \"default\" not found" event="&Event{ObjectMeta:{localhost.18109a386b07b842 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2024-12-13 02:03:43.642155074 +0000 UTC m=+0.389439661,LastTimestamp:2024-12-13 02:03:43.642155074 +0000 UTC m=+0.389439661,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" Dec 13 02:03:47.191233 kubelet[1597]: E1213 02:03:47.191083 1597 event.go:359] "Server rejected event (will not retry!)" err="namespaces \"default\" not found" event="&Event{ObjectMeta:{localhost.18109a386b5eff09 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2024-12-13 02:03:43.647874825 +0000 UTC m=+0.395159402,LastTimestamp:2024-12-13 02:03:43.647874825 +0000 UTC m=+0.395159402,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" Dec 13 02:03:47.194314 kubelet[1597]: E1213 02:03:47.194257 1597 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 02:03:47.245579 kubelet[1597]: E1213 02:03:47.245357 1597 event.go:359] "Server rejected event (will not retry!)" err="namespaces \"default\" not found" event="&Event{ObjectMeta:{localhost.18109a386c509c02 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientMemory,Message:Node localhost status is now: NodeHasSufficientMemory,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2024-12-13 02:03:43.663709186 +0000 UTC m=+0.410993773,LastTimestamp:2024-12-13 02:03:43.663709186 +0000 UTC m=+0.410993773,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" Dec 13 02:03:47.625375 kubelet[1597]: I1213 02:03:47.625237 1597 apiserver.go:52] "Watching apiserver" Dec 13 02:03:47.647323 kubelet[1597]: I1213 02:03:47.647286 1597 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" Dec 13 02:03:47.679783 kubelet[1597]: E1213 02:03:47.679733 1597 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-localhost" Dec 13 02:03:47.680253 kubelet[1597]: E1213 02:03:47.679915 1597 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:47.680253 kubelet[1597]: E1213 02:03:47.680235 1597 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-localhost" Dec 13 02:03:47.680345 kubelet[1597]: E1213 02:03:47.680329 1597 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:49.189332 systemd[1]: Reloading. Dec 13 02:03:49.268914 /usr/lib/systemd/system-generators/torcx-generator[1885]: time="2024-12-13T02:03:49Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:03:49.268960 /usr/lib/systemd/system-generators/torcx-generator[1885]: time="2024-12-13T02:03:49Z" level=info msg="torcx already run" Dec 13 02:03:49.347008 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:03:49.347027 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:03:49.371948 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:03:49.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.469709 kernel: kauditd_printk_skb: 581 callbacks suppressed Dec 13 02:03:49.469789 kernel: audit: type=1400 audit(1734055429.460:561): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.469818 kernel: audit: type=1400 audit(1734055429.460:562): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.474373 kernel: audit: type=1400 audit(1734055429.460:563): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.474431 kernel: audit: type=1400 audit(1734055429.460:564): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.481235 kernel: audit: type=1400 audit(1734055429.460:565): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.481307 kernel: audit: type=1400 audit(1734055429.460:566): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.487425 kernel: audit: type=1400 audit(1734055429.460:567): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.487490 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 02:03:49.487517 kernel: audit: type=1400 audit(1734055429.460:568): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.488263 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 02:03:49.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.464000 audit: BPF prog-id=85 op=LOAD Dec 13 02:03:49.464000 audit: BPF prog-id=73 op=UNLOAD Dec 13 02:03:49.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.468000 audit: BPF prog-id=86 op=LOAD Dec 13 02:03:49.468000 audit: BPF prog-id=46 op=UNLOAD Dec 13 02:03:49.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.473000 audit: BPF prog-id=87 op=LOAD Dec 13 02:03:49.473000 audit: BPF prog-id=47 op=UNLOAD Dec 13 02:03:49.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.476000 audit: BPF prog-id=88 op=LOAD Dec 13 02:03:49.476000 audit: BPF prog-id=48 op=UNLOAD Dec 13 02:03:49.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.480000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.480000 audit: BPF prog-id=89 op=LOAD Dec 13 02:03:49.480000 audit: BPF prog-id=49 op=UNLOAD Dec 13 02:03:49.480000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.480000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.480000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.483000 audit: BPF prog-id=90 op=LOAD Dec 13 02:03:49.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.491000 audit: BPF prog-id=50 op=UNLOAD Dec 13 02:03:49.491000 audit: BPF prog-id=51 op=UNLOAD Dec 13 02:03:49.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.492000 audit: BPF prog-id=92 op=LOAD Dec 13 02:03:49.492000 audit: BPF prog-id=52 op=UNLOAD Dec 13 02:03:49.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.492000 audit: BPF prog-id=93 op=LOAD Dec 13 02:03:49.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.492000 audit: BPF prog-id=94 op=LOAD Dec 13 02:03:49.492000 audit: BPF prog-id=53 op=UNLOAD Dec 13 02:03:49.492000 audit: BPF prog-id=54 op=UNLOAD Dec 13 02:03:49.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.492000 audit: BPF prog-id=95 op=LOAD Dec 13 02:03:49.492000 audit: BPF prog-id=81 op=UNLOAD Dec 13 02:03:49.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.493000 audit: BPF prog-id=96 op=LOAD Dec 13 02:03:49.493000 audit: BPF prog-id=61 op=UNLOAD Dec 13 02:03:49.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.494000 audit: BPF prog-id=97 op=LOAD Dec 13 02:03:49.494000 audit: BPF prog-id=77 op=UNLOAD Dec 13 02:03:49.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.494000 audit: BPF prog-id=98 op=LOAD Dec 13 02:03:49.494000 audit: BPF prog-id=55 op=UNLOAD Dec 13 02:03:49.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.495000 audit: BPF prog-id=99 op=LOAD Dec 13 02:03:49.495000 audit: BPF prog-id=56 op=UNLOAD Dec 13 02:03:49.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.496000 audit: BPF prog-id=100 op=LOAD Dec 13 02:03:49.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.496000 audit: BPF prog-id=101 op=LOAD Dec 13 02:03:49.496000 audit: BPF prog-id=57 op=UNLOAD Dec 13 02:03:49.496000 audit: BPF prog-id=58 op=UNLOAD Dec 13 02:03:49.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.497000 audit: BPF prog-id=102 op=LOAD Dec 13 02:03:49.497000 audit: BPF prog-id=65 op=UNLOAD Dec 13 02:03:49.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.498000 audit: BPF prog-id=103 op=LOAD Dec 13 02:03:49.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.499000 audit: BPF prog-id=104 op=LOAD Dec 13 02:03:49.499000 audit: BPF prog-id=59 op=UNLOAD Dec 13 02:03:49.499000 audit: BPF prog-id=60 op=UNLOAD Dec 13 02:03:49.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.500000 audit: BPF prog-id=105 op=LOAD Dec 13 02:03:49.500000 audit: BPF prog-id=69 op=UNLOAD Dec 13 02:03:49.512338 systemd[1]: Stopping kubelet.service... Dec 13 02:03:49.538584 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 02:03:49.538771 systemd[1]: Stopped kubelet.service. Dec 13 02:03:49.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:49.540699 systemd[1]: Starting kubelet.service... Dec 13 02:03:49.623716 systemd[1]: Started kubelet.service. Dec 13 02:03:49.622000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:49.657831 kubelet[1930]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 02:03:49.657831 kubelet[1930]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 02:03:49.657831 kubelet[1930]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 02:03:49.658204 kubelet[1930]: I1213 02:03:49.657872 1930 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 02:03:49.663803 kubelet[1930]: I1213 02:03:49.663763 1930 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" Dec 13 02:03:49.663803 kubelet[1930]: I1213 02:03:49.663791 1930 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 02:03:49.664679 kubelet[1930]: I1213 02:03:49.664636 1930 server.go:929] "Client rotation is on, will bootstrap in background" Dec 13 02:03:49.667045 kubelet[1930]: I1213 02:03:49.667018 1930 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Dec 13 02:03:49.668604 kubelet[1930]: I1213 02:03:49.668588 1930 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 02:03:49.671736 kubelet[1930]: E1213 02:03:49.671706 1930 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Dec 13 02:03:49.671736 kubelet[1930]: I1213 02:03:49.671736 1930 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Dec 13 02:03:49.675150 kubelet[1930]: I1213 02:03:49.675125 1930 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 02:03:49.675254 kubelet[1930]: I1213 02:03:49.675237 1930 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Dec 13 02:03:49.675377 kubelet[1930]: I1213 02:03:49.675341 1930 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 02:03:49.675527 kubelet[1930]: I1213 02:03:49.675371 1930 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Dec 13 02:03:49.675607 kubelet[1930]: I1213 02:03:49.675527 1930 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 02:03:49.675607 kubelet[1930]: I1213 02:03:49.675536 1930 container_manager_linux.go:300] "Creating device plugin manager" Dec 13 02:03:49.675607 kubelet[1930]: I1213 02:03:49.675562 1930 state_mem.go:36] "Initialized new in-memory state store" Dec 13 02:03:49.675673 kubelet[1930]: I1213 02:03:49.675640 1930 kubelet.go:408] "Attempting to sync node with API server" Dec 13 02:03:49.675673 kubelet[1930]: I1213 02:03:49.675650 1930 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 02:03:49.675673 kubelet[1930]: I1213 02:03:49.675673 1930 kubelet.go:314] "Adding apiserver pod source" Dec 13 02:03:49.675734 kubelet[1930]: I1213 02:03:49.675686 1930 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 02:03:49.678509 kubelet[1930]: I1213 02:03:49.676443 1930 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 02:03:49.678509 kubelet[1930]: I1213 02:03:49.676870 1930 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 02:03:49.678509 kubelet[1930]: I1213 02:03:49.677499 1930 server.go:1269] "Started kubelet" Dec 13 02:03:49.678509 kubelet[1930]: I1213 02:03:49.677951 1930 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 02:03:49.678509 kubelet[1930]: I1213 02:03:49.678050 1930 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 02:03:49.678509 kubelet[1930]: I1213 02:03:49.678314 1930 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 02:03:49.679491 kubelet[1930]: I1213 02:03:49.679462 1930 server.go:460] "Adding debug handlers to kubelet server" Dec 13 02:03:49.681728 kubelet[1930]: I1213 02:03:49.681698 1930 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 02:03:49.681838 kubelet[1930]: I1213 02:03:49.681736 1930 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 02:03:49.681838 kubelet[1930]: I1213 02:03:49.681762 1930 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 02:03:49.682506 kubelet[1930]: I1213 02:03:49.682476 1930 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Dec 13 02:03:49.682806 kubelet[1930]: I1213 02:03:49.682783 1930 volume_manager.go:289] "Starting Kubelet Volume Manager" Dec 13 02:03:49.682953 kubelet[1930]: E1213 02:03:49.682933 1930 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 02:03:49.680000 audit[1930]: AVC avc: denied { mac_admin } for pid=1930 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.680000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:03:49.680000 audit[1930]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000cea000 a1=c000a355d8 a2=c000b01fb0 a3=25 items=0 ppid=1 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:49.680000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:03:49.680000 audit[1930]: AVC avc: denied { mac_admin } for pid=1930 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.680000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:03:49.680000 audit[1930]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b54e80 a1=c000a355f0 a2=c000cea090 a3=25 items=0 ppid=1 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:49.680000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:03:49.683397 kubelet[1930]: I1213 02:03:49.683332 1930 desired_state_of_world_populator.go:146] "Desired state populator starts to run" Dec 13 02:03:49.683750 kubelet[1930]: I1213 02:03:49.683730 1930 reconciler.go:26] "Reconciler: start to sync state" Dec 13 02:03:49.684612 kubelet[1930]: I1213 02:03:49.684593 1930 factory.go:221] Registration of the systemd container factory successfully Dec 13 02:03:49.685291 kubelet[1930]: I1213 02:03:49.685249 1930 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 02:03:49.692050 kubelet[1930]: E1213 02:03:49.692017 1930 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 02:03:49.695358 kubelet[1930]: I1213 02:03:49.695322 1930 factory.go:221] Registration of the containerd container factory successfully Dec 13 02:03:49.700985 kubelet[1930]: I1213 02:03:49.700948 1930 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 02:03:49.702078 kubelet[1930]: I1213 02:03:49.702059 1930 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 02:03:49.702213 kubelet[1930]: I1213 02:03:49.702166 1930 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 02:03:49.702348 kubelet[1930]: I1213 02:03:49.702332 1930 kubelet.go:2321] "Starting kubelet main sync loop" Dec 13 02:03:49.702501 kubelet[1930]: E1213 02:03:49.702467 1930 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 02:03:49.726617 kubelet[1930]: I1213 02:03:49.726522 1930 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 02:03:49.726782 kubelet[1930]: I1213 02:03:49.726758 1930 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 02:03:49.726782 kubelet[1930]: I1213 02:03:49.726783 1930 state_mem.go:36] "Initialized new in-memory state store" Dec 13 02:03:49.726913 kubelet[1930]: I1213 02:03:49.726897 1930 state_mem.go:88] "Updated default CPUSet" cpuSet="" Dec 13 02:03:49.726961 kubelet[1930]: I1213 02:03:49.726910 1930 state_mem.go:96] "Updated CPUSet assignments" assignments={} Dec 13 02:03:49.726961 kubelet[1930]: I1213 02:03:49.726927 1930 policy_none.go:49] "None policy: Start" Dec 13 02:03:49.727567 kubelet[1930]: I1213 02:03:49.727546 1930 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 02:03:49.727650 kubelet[1930]: I1213 02:03:49.727577 1930 state_mem.go:35] "Initializing new in-memory state store" Dec 13 02:03:49.727735 kubelet[1930]: I1213 02:03:49.727715 1930 state_mem.go:75] "Updated machine memory state" Dec 13 02:03:49.731499 kubelet[1930]: I1213 02:03:49.731471 1930 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 02:03:49.730000 audit[1930]: AVC avc: denied { mac_admin } for pid=1930 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:49.730000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:03:49.730000 audit[1930]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000fad770 a1=c001322cc0 a2=c000fad740 a3=25 items=0 ppid=1 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:49.730000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:03:49.731711 kubelet[1930]: I1213 02:03:49.731533 1930 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 02:03:49.731711 kubelet[1930]: I1213 02:03:49.731661 1930 eviction_manager.go:189] "Eviction manager: starting control loop" Dec 13 02:03:49.731711 kubelet[1930]: I1213 02:03:49.731672 1930 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 02:03:49.732841 kubelet[1930]: I1213 02:03:49.732810 1930 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 02:03:49.834569 kubelet[1930]: I1213 02:03:49.834527 1930 kubelet_node_status.go:72] "Attempting to register node" node="localhost" Dec 13 02:03:49.883916 kubelet[1930]: I1213 02:03:49.883861 1930 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a52b86ce975f496e6002ba953fa9b888-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"a52b86ce975f496e6002ba953fa9b888\") " pod="kube-system/kube-scheduler-localhost" Dec 13 02:03:49.883916 kubelet[1930]: I1213 02:03:49.883899 1930 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/308d3a5f9fd6a80d985501a1200097a4-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"308d3a5f9fd6a80d985501a1200097a4\") " pod="kube-system/kube-apiserver-localhost" Dec 13 02:03:49.883916 kubelet[1930]: I1213 02:03:49.883914 1930 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/308d3a5f9fd6a80d985501a1200097a4-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"308d3a5f9fd6a80d985501a1200097a4\") " pod="kube-system/kube-apiserver-localhost" Dec 13 02:03:49.883916 kubelet[1930]: I1213 02:03:49.883926 1930 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 02:03:49.884154 kubelet[1930]: I1213 02:03:49.883939 1930 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 02:03:49.884154 kubelet[1930]: I1213 02:03:49.883959 1930 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 02:03:49.884154 kubelet[1930]: I1213 02:03:49.883971 1930 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 02:03:49.884154 kubelet[1930]: I1213 02:03:49.884017 1930 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 02:03:49.884154 kubelet[1930]: I1213 02:03:49.884033 1930 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/308d3a5f9fd6a80d985501a1200097a4-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"308d3a5f9fd6a80d985501a1200097a4\") " pod="kube-system/kube-apiserver-localhost" Dec 13 02:03:49.917130 kubelet[1930]: I1213 02:03:49.917084 1930 kubelet_node_status.go:111] "Node was previously registered" node="localhost" Dec 13 02:03:49.917351 kubelet[1930]: I1213 02:03:49.917209 1930 kubelet_node_status.go:75] "Successfully registered node" node="localhost" Dec 13 02:03:49.933000 audit[1817]: AVC avc: denied { watch } for pid=1817 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c652,c793 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:03:49.933000 audit[1817]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00099f200 a2=fc6 a3=0 items=0 ppid=1673 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c652,c793 key=(null) Dec 13 02:03:49.933000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:03:49.933000 audit[1817]: AVC avc: denied { watch } for pid=1817 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c652,c793 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:03:49.933000 audit[1817]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00099f3c0 a2=fc6 a3=0 items=0 ppid=1673 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c652,c793 key=(null) Dec 13 02:03:49.933000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:03:49.933000 audit[1817]: AVC avc: denied { watch } for pid=1817 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c652,c793 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:03:49.933000 audit[1817]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00099f400 a2=fc6 a3=0 items=0 ppid=1673 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c652,c793 key=(null) Dec 13 02:03:49.933000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:03:49.934000 audit[1817]: AVC avc: denied { watch } for pid=1817 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c652,c793 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:03:49.934000 audit[1817]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0008759a0 a2=fc6 a3=0 items=0 ppid=1673 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c652,c793 key=(null) Dec 13 02:03:49.934000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:03:50.210329 kubelet[1930]: E1213 02:03:50.210251 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:50.210929 kubelet[1930]: E1213 02:03:50.210881 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:50.211146 kubelet[1930]: E1213 02:03:50.211099 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:50.676553 kubelet[1930]: I1213 02:03:50.676374 1930 apiserver.go:52] "Watching apiserver" Dec 13 02:03:50.683985 kubelet[1930]: I1213 02:03:50.683933 1930 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" Dec 13 02:03:50.715044 kubelet[1930]: E1213 02:03:50.715001 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:50.715301 kubelet[1930]: E1213 02:03:50.715267 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:50.715450 kubelet[1930]: E1213 02:03:50.715423 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:50.738141 kubelet[1930]: I1213 02:03:50.738059 1930 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=1.7380383209999999 podStartE2EDuration="1.738038321s" podCreationTimestamp="2024-12-13 02:03:49 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:03:50.725553208 +0000 UTC m=+1.097759490" watchObservedRunningTime="2024-12-13 02:03:50.738038321 +0000 UTC m=+1.110244613" Dec 13 02:03:50.738571 kubelet[1930]: I1213 02:03:50.738502 1930 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.738495251 podStartE2EDuration="1.738495251s" podCreationTimestamp="2024-12-13 02:03:49 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:03:50.737787659 +0000 UTC m=+1.109993951" watchObservedRunningTime="2024-12-13 02:03:50.738495251 +0000 UTC m=+1.110701543" Dec 13 02:03:50.751903 kubelet[1930]: I1213 02:03:50.751822 1930 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.7518070529999998 podStartE2EDuration="1.751807053s" podCreationTimestamp="2024-12-13 02:03:49 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:03:50.744550958 +0000 UTC m=+1.116757250" watchObservedRunningTime="2024-12-13 02:03:50.751807053 +0000 UTC m=+1.124013345" Dec 13 02:03:51.715952 kubelet[1930]: E1213 02:03:51.715910 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:53.916000 audit[1817]: AVC avc: denied { watch } for pid=1817 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=7322 scontext=system_u:system_r:svirt_lxc_net_t:s0:c652,c793 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 02:03:53.916000 audit[1817]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000a88400 a2=fc6 a3=0 items=0 ppid=1673 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c652,c793 key=(null) Dec 13 02:03:53.916000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:03:54.528306 kubelet[1930]: I1213 02:03:54.528250 1930 kuberuntime_manager.go:1633] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Dec 13 02:03:54.528786 kubelet[1930]: I1213 02:03:54.528727 1930 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Dec 13 02:03:54.528841 env[1201]: time="2024-12-13T02:03:54.528526224Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 02:03:54.954666 kubelet[1930]: E1213 02:03:54.954623 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:55.509325 systemd[1]: Created slice kubepods-besteffort-podd1823b70_12e9_4ad0_aead_25a391ef1287.slice. Dec 13 02:03:55.564181 systemd[1]: Created slice kubepods-besteffort-poda7855a51_7969_4767_87f2_f89f5b92734e.slice. Dec 13 02:03:55.625092 kubelet[1930]: I1213 02:03:55.625045 1930 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/d1823b70-12e9-4ad0-aead-25a391ef1287-lib-modules\") pod \"kube-proxy-v9zt2\" (UID: \"d1823b70-12e9-4ad0-aead-25a391ef1287\") " pod="kube-system/kube-proxy-v9zt2" Dec 13 02:03:55.625092 kubelet[1930]: I1213 02:03:55.625094 1930 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/d1823b70-12e9-4ad0-aead-25a391ef1287-kube-proxy\") pod \"kube-proxy-v9zt2\" (UID: \"d1823b70-12e9-4ad0-aead-25a391ef1287\") " pod="kube-system/kube-proxy-v9zt2" Dec 13 02:03:55.625613 kubelet[1930]: I1213 02:03:55.625114 1930 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/d1823b70-12e9-4ad0-aead-25a391ef1287-xtables-lock\") pod \"kube-proxy-v9zt2\" (UID: \"d1823b70-12e9-4ad0-aead-25a391ef1287\") " pod="kube-system/kube-proxy-v9zt2" Dec 13 02:03:55.625613 kubelet[1930]: I1213 02:03:55.625131 1930 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-t6rfz\" (UniqueName: \"kubernetes.io/projected/d1823b70-12e9-4ad0-aead-25a391ef1287-kube-api-access-t6rfz\") pod \"kube-proxy-v9zt2\" (UID: \"d1823b70-12e9-4ad0-aead-25a391ef1287\") " pod="kube-system/kube-proxy-v9zt2" Dec 13 02:03:55.726032 kubelet[1930]: I1213 02:03:55.725967 1930 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/a7855a51-7969-4767-87f2-f89f5b92734e-var-lib-calico\") pod \"tigera-operator-76c4976dd7-szd8n\" (UID: \"a7855a51-7969-4767-87f2-f89f5b92734e\") " pod="tigera-operator/tigera-operator-76c4976dd7-szd8n" Dec 13 02:03:55.726032 kubelet[1930]: I1213 02:03:55.726025 1930 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-djqj7\" (UniqueName: \"kubernetes.io/projected/a7855a51-7969-4767-87f2-f89f5b92734e-kube-api-access-djqj7\") pod \"tigera-operator-76c4976dd7-szd8n\" (UID: \"a7855a51-7969-4767-87f2-f89f5b92734e\") " pod="tigera-operator/tigera-operator-76c4976dd7-szd8n" Dec 13 02:03:55.731418 kubelet[1930]: I1213 02:03:55.731387 1930 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Dec 13 02:03:55.818568 kubelet[1930]: E1213 02:03:55.818111 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:55.818885 env[1201]: time="2024-12-13T02:03:55.818825704Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-v9zt2,Uid:d1823b70-12e9-4ad0-aead-25a391ef1287,Namespace:kube-system,Attempt:0,}" Dec 13 02:03:55.869348 env[1201]: time="2024-12-13T02:03:55.869301986Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76c4976dd7-szd8n,Uid:a7855a51-7969-4767-87f2-f89f5b92734e,Namespace:tigera-operator,Attempt:0,}" Dec 13 02:03:55.998095 env[1201]: time="2024-12-13T02:03:55.998002922Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:03:55.998095 env[1201]: time="2024-12-13T02:03:55.998066958Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:03:55.998095 env[1201]: time="2024-12-13T02:03:55.998079998Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:03:55.998607 env[1201]: time="2024-12-13T02:03:55.998522187Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/30a76be69fb2e503d80cfe3037d6e0de6857ebeb24881d9a834747ca4573d4da pid=2001 runtime=io.containerd.runc.v2 Dec 13 02:03:56.012234 systemd[1]: Started cri-containerd-30a76be69fb2e503d80cfe3037d6e0de6857ebeb24881d9a834747ca4573d4da.scope. Dec 13 02:03:56.026979 kernel: kauditd_printk_skb: 275 callbacks suppressed Dec 13 02:03:56.027122 kernel: audit: type=1400 audit(1734055436.020:809): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.027149 kernel: audit: type=1400 audit(1734055436.020:810): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.033803 kernel: audit: type=1400 audit(1734055436.020:811): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.033874 kernel: audit: type=1400 audit(1734055436.020:812): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.041043 kernel: audit: type=1400 audit(1734055436.020:813): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.041130 kernel: audit: type=1400 audit(1734055436.020:814): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.044299 env[1201]: time="2024-12-13T02:03:56.044203341Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:03:56.044299 env[1201]: time="2024-12-13T02:03:56.044262144Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:03:56.044488 env[1201]: time="2024-12-13T02:03:56.044275504Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:03:56.044601 env[1201]: time="2024-12-13T02:03:56.044558233Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/db737dd1bf78f5db86caa89ba6e0257b4962bf363e6e9dda01430e5999906e00 pid=2036 runtime=io.containerd.runc.v2 Dec 13 02:03:56.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.048267 kernel: audit: type=1400 audit(1734055436.020:815): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.048364 kernel: audit: type=1400 audit(1734055436.020:816): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.051824 kernel: audit: type=1400 audit(1734055436.020:817): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.058821 kernel: audit: type=1400 audit(1734055436.025:818): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.025000 audit: BPF prog-id=106 op=LOAD Dec 13 02:03:56.026000 audit[2011]: AVC avc: denied { bpf } for pid=2011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.026000 audit[2011]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2001 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.026000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330613736626536396662326535303364383063666533303337643665 Dec 13 02:03:56.026000 audit[2011]: AVC avc: denied { perfmon } for pid=2011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.026000 audit[2011]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2001 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.026000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330613736626536396662326535303364383063666533303337643665 Dec 13 02:03:56.026000 audit[2011]: AVC avc: denied { bpf } for pid=2011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.026000 audit[2011]: AVC avc: denied { bpf } for pid=2011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.026000 audit[2011]: AVC avc: denied { bpf } for pid=2011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.026000 audit[2011]: AVC avc: denied { perfmon } for pid=2011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.026000 audit[2011]: AVC avc: denied { perfmon } for pid=2011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.026000 audit[2011]: AVC avc: denied { perfmon } for pid=2011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.026000 audit[2011]: AVC avc: denied { perfmon } for pid=2011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.026000 audit[2011]: AVC avc: denied { perfmon } for pid=2011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.026000 audit[2011]: AVC avc: denied { bpf } for pid=2011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.026000 audit[2011]: AVC avc: denied { bpf } for pid=2011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.026000 audit: BPF prog-id=107 op=LOAD Dec 13 02:03:56.026000 audit[2011]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00028cbe0 items=0 ppid=2001 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.026000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330613736626536396662326535303364383063666533303337643665 Dec 13 02:03:56.032000 audit[2011]: AVC avc: denied { bpf } for pid=2011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.032000 audit[2011]: AVC avc: denied { bpf } for pid=2011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.032000 audit[2011]: AVC avc: denied { perfmon } for pid=2011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.032000 audit[2011]: AVC avc: denied { perfmon } for pid=2011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.032000 audit[2011]: AVC avc: denied { perfmon } for pid=2011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.032000 audit[2011]: AVC avc: denied { perfmon } for pid=2011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.032000 audit[2011]: AVC avc: denied { perfmon } for pid=2011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.032000 audit[2011]: AVC avc: denied { bpf } for pid=2011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.032000 audit[2011]: AVC avc: denied { bpf } for pid=2011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.032000 audit: BPF prog-id=108 op=LOAD Dec 13 02:03:56.032000 audit[2011]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00028cc28 items=0 ppid=2001 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.032000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330613736626536396662326535303364383063666533303337643665 Dec 13 02:03:56.039000 audit: BPF prog-id=108 op=UNLOAD Dec 13 02:03:56.039000 audit: BPF prog-id=107 op=UNLOAD Dec 13 02:03:56.039000 audit[2011]: AVC avc: denied { bpf } for pid=2011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.039000 audit[2011]: AVC avc: denied { bpf } for pid=2011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.039000 audit[2011]: AVC avc: denied { bpf } for pid=2011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.039000 audit[2011]: AVC avc: denied { perfmon } for pid=2011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.039000 audit[2011]: AVC avc: denied { perfmon } for pid=2011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.039000 audit[2011]: AVC avc: denied { perfmon } for pid=2011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.039000 audit[2011]: AVC avc: denied { perfmon } for pid=2011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.039000 audit[2011]: AVC avc: denied { perfmon } for pid=2011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.039000 audit[2011]: AVC avc: denied { bpf } for pid=2011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.039000 audit[2011]: AVC avc: denied { bpf } for pid=2011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.039000 audit: BPF prog-id=109 op=LOAD Dec 13 02:03:56.039000 audit[2011]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00028d038 items=0 ppid=2001 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330613736626536396662326535303364383063666533303337643665 Dec 13 02:03:56.069986 env[1201]: time="2024-12-13T02:03:56.069704265Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-v9zt2,Uid:d1823b70-12e9-4ad0-aead-25a391ef1287,Namespace:kube-system,Attempt:0,} returns sandbox id \"30a76be69fb2e503d80cfe3037d6e0de6857ebeb24881d9a834747ca4573d4da\"" Dec 13 02:03:56.070320 systemd[1]: Started cri-containerd-db737dd1bf78f5db86caa89ba6e0257b4962bf363e6e9dda01430e5999906e00.scope. Dec 13 02:03:56.071607 kubelet[1930]: E1213 02:03:56.071545 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:56.078029 env[1201]: time="2024-12-13T02:03:56.077952569Z" level=info msg="CreateContainer within sandbox \"30a76be69fb2e503d80cfe3037d6e0de6857ebeb24881d9a834747ca4573d4da\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 02:03:56.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.083000 audit: BPF prog-id=110 op=LOAD Dec 13 02:03:56.084000 audit[2046]: AVC avc: denied { bpf } for pid=2046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.084000 audit[2046]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2036 pid=2046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462373337646431626637386635646238366361613839626136653032 Dec 13 02:03:56.084000 audit[2046]: AVC avc: denied { perfmon } for pid=2046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.084000 audit[2046]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2036 pid=2046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462373337646431626637386635646238366361613839626136653032 Dec 13 02:03:56.084000 audit[2046]: AVC avc: denied { bpf } for pid=2046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.084000 audit[2046]: AVC avc: denied { bpf } for pid=2046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.084000 audit[2046]: AVC avc: denied { bpf } for pid=2046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.084000 audit[2046]: AVC avc: denied { perfmon } for pid=2046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.084000 audit[2046]: AVC avc: denied { perfmon } for pid=2046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.084000 audit[2046]: AVC avc: denied { perfmon } for pid=2046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.084000 audit[2046]: AVC avc: denied { perfmon } for pid=2046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.084000 audit[2046]: AVC avc: denied { perfmon } for pid=2046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.084000 audit[2046]: AVC avc: denied { bpf } for pid=2046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.084000 audit[2046]: AVC avc: denied { bpf } for pid=2046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.084000 audit: BPF prog-id=111 op=LOAD Dec 13 02:03:56.084000 audit[2046]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000400a70 items=0 ppid=2036 pid=2046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462373337646431626637386635646238366361613839626136653032 Dec 13 02:03:56.084000 audit[2046]: AVC avc: denied { bpf } for pid=2046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.084000 audit[2046]: AVC avc: denied { bpf } for pid=2046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.084000 audit[2046]: AVC avc: denied { perfmon } for pid=2046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.084000 audit[2046]: AVC avc: denied { perfmon } for pid=2046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.084000 audit[2046]: AVC avc: denied { perfmon } for pid=2046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.084000 audit[2046]: AVC avc: denied { perfmon } for pid=2046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.084000 audit[2046]: AVC avc: denied { perfmon } for pid=2046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.084000 audit[2046]: AVC avc: denied { bpf } for pid=2046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.084000 audit[2046]: AVC avc: denied { bpf } for pid=2046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.084000 audit: BPF prog-id=112 op=LOAD Dec 13 02:03:56.084000 audit[2046]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000400ab8 items=0 ppid=2036 pid=2046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462373337646431626637386635646238366361613839626136653032 Dec 13 02:03:56.084000 audit: BPF prog-id=112 op=UNLOAD Dec 13 02:03:56.084000 audit: BPF prog-id=111 op=UNLOAD Dec 13 02:03:56.084000 audit[2046]: AVC avc: denied { bpf } for pid=2046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.084000 audit[2046]: AVC avc: denied { bpf } for pid=2046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.084000 audit[2046]: AVC avc: denied { bpf } for pid=2046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.084000 audit[2046]: AVC avc: denied { perfmon } for pid=2046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.084000 audit[2046]: AVC avc: denied { perfmon } for pid=2046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.084000 audit[2046]: AVC avc: denied { perfmon } for pid=2046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.084000 audit[2046]: AVC avc: denied { perfmon } for pid=2046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.084000 audit[2046]: AVC avc: denied { perfmon } for pid=2046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.084000 audit[2046]: AVC avc: denied { bpf } for pid=2046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.084000 audit[2046]: AVC avc: denied { bpf } for pid=2046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.084000 audit: BPF prog-id=113 op=LOAD Dec 13 02:03:56.084000 audit[2046]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000400ec8 items=0 ppid=2036 pid=2046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462373337646431626637386635646238366361613839626136653032 Dec 13 02:03:56.107762 env[1201]: time="2024-12-13T02:03:56.107718133Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76c4976dd7-szd8n,Uid:a7855a51-7969-4767-87f2-f89f5b92734e,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"db737dd1bf78f5db86caa89ba6e0257b4962bf363e6e9dda01430e5999906e00\"" Dec 13 02:03:56.110396 env[1201]: time="2024-12-13T02:03:56.110363293Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Dec 13 02:03:56.313605 env[1201]: time="2024-12-13T02:03:56.313522283Z" level=info msg="CreateContainer within sandbox \"30a76be69fb2e503d80cfe3037d6e0de6857ebeb24881d9a834747ca4573d4da\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"f92384ddadc6698e1a2a7e3c4e9294597706b33e8118435c4e55fa0e9ccf6138\"" Dec 13 02:03:56.314392 env[1201]: time="2024-12-13T02:03:56.314360629Z" level=info msg="StartContainer for \"f92384ddadc6698e1a2a7e3c4e9294597706b33e8118435c4e55fa0e9ccf6138\"" Dec 13 02:03:56.383000 audit[1336]: USER_END pid=1336 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:03:56.383000 audit[1336]: CRED_DISP pid=1336 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:03:56.385036 sudo[1336]: pam_unix(sudo:session): session closed for user root Dec 13 02:03:56.387719 sshd[1333]: pam_unix(sshd:session): session closed for user core Dec 13 02:03:56.388000 audit[1333]: USER_END pid=1333 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:56.388000 audit[1333]: CRED_DISP pid=1333 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:56.390890 systemd[1]: sshd@6-10.0.0.95:22-10.0.0.1:52788.service: Deactivated successfully. Dec 13 02:03:56.391707 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 02:03:56.391871 systemd[1]: session-7.scope: Consumed 3.790s CPU time. Dec 13 02:03:56.389000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.95:22-10.0.0.1:52788 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:56.392702 systemd-logind[1186]: Session 7 logged out. Waiting for processes to exit. Dec 13 02:03:56.393590 systemd-logind[1186]: Removed session 7. Dec 13 02:03:56.465588 systemd[1]: Started cri-containerd-f92384ddadc6698e1a2a7e3c4e9294597706b33e8118435c4e55fa0e9ccf6138.scope. Dec 13 02:03:56.477000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.477000 audit[2103]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f4a04427c18 items=0 ppid=2001 pid=2103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639323338346464616463363639386531613261376533633465393239 Dec 13 02:03:56.477000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.477000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.477000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.477000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.477000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.477000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.477000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.477000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.477000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.477000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.477000 audit: BPF prog-id=114 op=LOAD Dec 13 02:03:56.477000 audit[2103]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000388068 items=0 ppid=2001 pid=2103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639323338346464616463363639386531613261376533633465393239 Dec 13 02:03:56.477000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.477000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.477000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.477000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.477000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.477000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.477000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.477000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.477000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.477000 audit: BPF prog-id=115 op=LOAD Dec 13 02:03:56.477000 audit[2103]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003880b8 items=0 ppid=2001 pid=2103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639323338346464616463363639386531613261376533633465393239 Dec 13 02:03:56.477000 audit: BPF prog-id=115 op=UNLOAD Dec 13 02:03:56.477000 audit: BPF prog-id=114 op=UNLOAD Dec 13 02:03:56.477000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.477000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.477000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.477000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.477000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.477000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.477000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.477000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.477000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.477000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:03:56.477000 audit: BPF prog-id=116 op=LOAD Dec 13 02:03:56.477000 audit[2103]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000388148 items=0 ppid=2001 pid=2103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639323338346464616463363639386531613261376533633465393239 Dec 13 02:03:56.517738 env[1201]: time="2024-12-13T02:03:56.517647800Z" level=info msg="StartContainer for \"f92384ddadc6698e1a2a7e3c4e9294597706b33e8118435c4e55fa0e9ccf6138\" returns successfully" Dec 13 02:03:56.594000 audit[2164]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2164 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:56.594000 audit[2164]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffda02e9c90 a2=0 a3=7ffda02e9c7c items=0 ppid=2114 pid=2164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.594000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 02:03:56.594000 audit[2163]: NETFILTER_CFG table=mangle:39 family=2 entries=1 op=nft_register_chain pid=2163 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:56.594000 audit[2163]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffda6966b10 a2=0 a3=7ffda6966afc items=0 ppid=2114 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.594000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 02:03:56.596000 audit[2165]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2165 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:56.596000 audit[2165]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffefc35a080 a2=0 a3=7ffefc35a06c items=0 ppid=2114 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.596000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 02:03:56.596000 audit[2166]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2166 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:56.596000 audit[2166]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd526b9540 a2=0 a3=7ffd526b952c items=0 ppid=2114 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.596000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 02:03:56.597000 audit[2168]: NETFILTER_CFG table=filter:42 family=10 entries=1 op=nft_register_chain pid=2168 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:56.597000 audit[2168]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc5bc43eb0 a2=0 a3=7ffc5bc43e9c items=0 ppid=2114 pid=2168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.597000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 02:03:56.597000 audit[2167]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2167 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:56.597000 audit[2167]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff3060d660 a2=0 a3=7fff3060d64c items=0 ppid=2114 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.597000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 02:03:56.697000 audit[2169]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2169 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:56.697000 audit[2169]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffce72becf0 a2=0 a3=7ffce72becdc items=0 ppid=2114 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.697000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 02:03:56.700000 audit[2171]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2171 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:56.700000 audit[2171]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffeeaf570c0 a2=0 a3=7ffeeaf570ac items=0 ppid=2114 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.700000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 02:03:56.703000 audit[2174]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2174 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:56.703000 audit[2174]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc74bacbb0 a2=0 a3=7ffc74bacb9c items=0 ppid=2114 pid=2174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.703000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 02:03:56.704000 audit[2175]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2175 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:56.704000 audit[2175]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcec877820 a2=0 a3=7ffcec87780c items=0 ppid=2114 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.704000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 02:03:56.707000 audit[2177]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2177 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:56.707000 audit[2177]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffda310b110 a2=0 a3=7ffda310b0fc items=0 ppid=2114 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.707000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 02:03:56.708000 audit[2178]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2178 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:56.708000 audit[2178]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdb667f110 a2=0 a3=7ffdb667f0fc items=0 ppid=2114 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.708000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 02:03:56.710000 audit[2180]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2180 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:56.710000 audit[2180]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffa788a210 a2=0 a3=7fffa788a1fc items=0 ppid=2114 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.710000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 02:03:56.713000 audit[2183]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2183 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:56.713000 audit[2183]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff1da123c0 a2=0 a3=7fff1da123ac items=0 ppid=2114 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.713000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 02:03:56.714000 audit[2184]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2184 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:56.714000 audit[2184]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc86b43c70 a2=0 a3=7ffc86b43c5c items=0 ppid=2114 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.714000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 02:03:56.716000 audit[2186]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2186 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:56.716000 audit[2186]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc1eefae60 a2=0 a3=7ffc1eefae4c items=0 ppid=2114 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.716000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 02:03:56.717000 audit[2187]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2187 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:56.717000 audit[2187]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd9c232070 a2=0 a3=7ffd9c23205c items=0 ppid=2114 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.717000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 02:03:56.719000 audit[2189]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2189 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:56.719000 audit[2189]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff059b6100 a2=0 a3=7fff059b60ec items=0 ppid=2114 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.719000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 02:03:56.723000 audit[2192]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2192 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:56.723000 audit[2192]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd851b8290 a2=0 a3=7ffd851b827c items=0 ppid=2114 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.723000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 02:03:56.725948 kubelet[1930]: E1213 02:03:56.725688 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:56.727000 audit[2195]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2195 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:56.727000 audit[2195]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffc4740560 a2=0 a3=7fffc474054c items=0 ppid=2114 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.727000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 02:03:56.729000 audit[2196]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2196 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:56.729000 audit[2196]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff307701b0 a2=0 a3=7fff3077019c items=0 ppid=2114 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.729000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 02:03:56.731000 audit[2198]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2198 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:56.731000 audit[2198]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffea7de3f60 a2=0 a3=7ffea7de3f4c items=0 ppid=2114 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.731000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:03:56.736000 audit[2201]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2201 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:56.736000 audit[2201]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff612b4af0 a2=0 a3=7fff612b4adc items=0 ppid=2114 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.736000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:03:56.737000 audit[2202]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2202 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:56.737000 audit[2202]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffff6195410 a2=0 a3=7ffff61953fc items=0 ppid=2114 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.737000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 02:03:56.738875 systemd[1]: run-containerd-runc-k8s.io-30a76be69fb2e503d80cfe3037d6e0de6857ebeb24881d9a834747ca4573d4da-runc.OIknxi.mount: Deactivated successfully. Dec 13 02:03:56.740000 audit[2204]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2204 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:03:56.740000 audit[2204]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffdf485bee0 a2=0 a3=7ffdf485becc items=0 ppid=2114 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.740000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 02:03:56.771000 audit[2210]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2210 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:03:56.771000 audit[2210]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd5b87a070 a2=0 a3=7ffd5b87a05c items=0 ppid=2114 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.771000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:03:56.781000 audit[2210]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2210 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:03:56.781000 audit[2210]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffd5b87a070 a2=0 a3=7ffd5b87a05c items=0 ppid=2114 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.781000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:03:56.782000 audit[2215]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2215 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:56.782000 audit[2215]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff3edd6130 a2=0 a3=7fff3edd611c items=0 ppid=2114 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.782000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 02:03:56.784000 audit[2217]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2217 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:56.784000 audit[2217]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd85610ec0 a2=0 a3=7ffd85610eac items=0 ppid=2114 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.784000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 02:03:56.787000 audit[2220]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2220 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:56.787000 audit[2220]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd80c90f50 a2=0 a3=7ffd80c90f3c items=0 ppid=2114 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.787000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 02:03:56.788000 audit[2221]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2221 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:56.788000 audit[2221]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc8e3d8ca0 a2=0 a3=7ffc8e3d8c8c items=0 ppid=2114 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.788000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 02:03:56.790000 audit[2223]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2223 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:56.790000 audit[2223]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffeec1e1760 a2=0 a3=7ffeec1e174c items=0 ppid=2114 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.790000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 02:03:56.791000 audit[2224]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2224 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:56.791000 audit[2224]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd0aefa440 a2=0 a3=7ffd0aefa42c items=0 ppid=2114 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.791000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 02:03:56.793000 audit[2226]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2226 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:56.793000 audit[2226]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe5230ed40 a2=0 a3=7ffe5230ed2c items=0 ppid=2114 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.793000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 02:03:56.796000 audit[2229]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2229 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:56.796000 audit[2229]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffe758bff40 a2=0 a3=7ffe758bff2c items=0 ppid=2114 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.796000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 02:03:56.797000 audit[2230]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2230 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:56.797000 audit[2230]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc280ddbd0 a2=0 a3=7ffc280ddbbc items=0 ppid=2114 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.797000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 02:03:56.799000 audit[2232]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2232 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:56.799000 audit[2232]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff0e75b140 a2=0 a3=7fff0e75b12c items=0 ppid=2114 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.799000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 02:03:56.800000 audit[2233]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2233 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:56.800000 audit[2233]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcfa8cd890 a2=0 a3=7ffcfa8cd87c items=0 ppid=2114 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.800000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 02:03:56.802000 audit[2235]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2235 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:56.802000 audit[2235]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcedb2e380 a2=0 a3=7ffcedb2e36c items=0 ppid=2114 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.802000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 02:03:56.805000 audit[2238]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2238 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:56.805000 audit[2238]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe2b861480 a2=0 a3=7ffe2b86146c items=0 ppid=2114 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.805000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 02:03:56.808000 audit[2241]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2241 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:56.808000 audit[2241]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcc86bab40 a2=0 a3=7ffcc86bab2c items=0 ppid=2114 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.808000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 02:03:56.809000 audit[2242]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2242 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:56.809000 audit[2242]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd88a076f0 a2=0 a3=7ffd88a076dc items=0 ppid=2114 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.809000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 02:03:56.811000 audit[2244]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2244 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:56.811000 audit[2244]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc8c1327c0 a2=0 a3=7ffc8c1327ac items=0 ppid=2114 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.811000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:03:56.813000 audit[2247]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2247 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:56.813000 audit[2247]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd24614ac0 a2=0 a3=7ffd24614aac items=0 ppid=2114 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.813000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:03:56.814000 audit[2248]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2248 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:56.814000 audit[2248]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc7a106680 a2=0 a3=7ffc7a10666c items=0 ppid=2114 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.814000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 02:03:56.816000 audit[2250]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2250 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:56.816000 audit[2250]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe74a41330 a2=0 a3=7ffe74a4131c items=0 ppid=2114 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.816000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 02:03:56.817000 audit[2251]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2251 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:56.817000 audit[2251]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff2cf0d4e0 a2=0 a3=7fff2cf0d4cc items=0 ppid=2114 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.817000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 02:03:56.819000 audit[2253]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2253 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:56.819000 audit[2253]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff634e4390 a2=0 a3=7fff634e437c items=0 ppid=2114 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.819000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:03:56.822000 audit[2256]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2256 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:03:56.822000 audit[2256]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd4f13cdc0 a2=0 a3=7ffd4f13cdac items=0 ppid=2114 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.822000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:03:56.827000 audit[2258]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2258 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 02:03:56.827000 audit[2258]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffede0c0cf0 a2=0 a3=7ffede0c0cdc items=0 ppid=2114 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.827000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:03:56.827000 audit[2258]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2258 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 02:03:56.827000 audit[2258]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffede0c0cf0 a2=0 a3=7ffede0c0cdc items=0 ppid=2114 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:56.827000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:03:57.040024 update_engine[1190]: I1213 02:03:57.039872 1190 update_attempter.cc:509] Updating boot flags... Dec 13 02:03:57.341993 kubelet[1930]: E1213 02:03:57.341859 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:57.366421 kubelet[1930]: I1213 02:03:57.366319 1930 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-v9zt2" podStartSLOduration=2.366301438 podStartE2EDuration="2.366301438s" podCreationTimestamp="2024-12-13 02:03:55 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:03:56.824367044 +0000 UTC m=+7.196573366" watchObservedRunningTime="2024-12-13 02:03:57.366301438 +0000 UTC m=+7.738507730" Dec 13 02:03:57.727149 kubelet[1930]: E1213 02:03:57.727107 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:57.727595 kubelet[1930]: E1213 02:03:57.727208 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:59.258075 kubelet[1930]: E1213 02:03:59.258045 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:59.731286 kubelet[1930]: E1213 02:03:59.731231 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:59.865847 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount730473936.mount: Deactivated successfully. Dec 13 02:04:01.066584 env[1201]: time="2024-12-13T02:04:01.066504833Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:01.116741 env[1201]: time="2024-12-13T02:04:01.116680996Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:01.165232 env[1201]: time="2024-12-13T02:04:01.165175450Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:01.167411 env[1201]: time="2024-12-13T02:04:01.167369263Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:01.168215 env[1201]: time="2024-12-13T02:04:01.168157047Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346\"" Dec 13 02:04:01.170150 env[1201]: time="2024-12-13T02:04:01.170111250Z" level=info msg="CreateContainer within sandbox \"db737dd1bf78f5db86caa89ba6e0257b4962bf363e6e9dda01430e5999906e00\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Dec 13 02:04:01.186434 env[1201]: time="2024-12-13T02:04:01.186375999Z" level=info msg="CreateContainer within sandbox \"db737dd1bf78f5db86caa89ba6e0257b4962bf363e6e9dda01430e5999906e00\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"b521ed9a537cfd394e882ae3afa5f3f990deae8e1ed48fc8e8d0e4504b14c796\"" Dec 13 02:04:01.187029 env[1201]: time="2024-12-13T02:04:01.186980564Z" level=info msg="StartContainer for \"b521ed9a537cfd394e882ae3afa5f3f990deae8e1ed48fc8e8d0e4504b14c796\"" Dec 13 02:04:01.204917 systemd[1]: Started cri-containerd-b521ed9a537cfd394e882ae3afa5f3f990deae8e1ed48fc8e8d0e4504b14c796.scope. Dec 13 02:04:01.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:01.218149 kernel: kauditd_printk_skb: 305 callbacks suppressed Dec 13 02:04:01.218385 kernel: audit: type=1400 audit(1734055441.215:907): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:01.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:01.225341 kernel: audit: type=1400 audit(1734055441.215:908): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:01.225462 kernel: audit: type=1400 audit(1734055441.217:909): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:01.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:01.228819 kernel: audit: type=1400 audit(1734055441.217:910): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:01.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:01.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:01.236528 kernel: audit: type=1400 audit(1734055441.217:911): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:01.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:01.240332 kernel: audit: type=1400 audit(1734055441.217:912): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:01.240418 kernel: audit: type=1400 audit(1734055441.217:913): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:01.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:01.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:01.247637 kernel: audit: type=1400 audit(1734055441.217:914): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:01.247695 kernel: audit: type=1400 audit(1734055441.217:915): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:01.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:01.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:01.255120 kernel: audit: type=1400 audit(1734055441.224:916): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:01.224000 audit: BPF prog-id=117 op=LOAD Dec 13 02:04:01.224000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:01.224000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2036 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:01.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235323165643961353337636664333934653838326165336166613566 Dec 13 02:04:01.224000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:01.224000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2036 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:01.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235323165643961353337636664333934653838326165336166613566 Dec 13 02:04:01.224000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:01.224000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:01.224000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:01.224000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:01.224000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:01.224000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:01.224000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:01.224000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:01.224000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:01.224000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:01.224000 audit: BPF prog-id=118 op=LOAD Dec 13 02:04:01.224000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000292fd0 items=0 ppid=2036 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:01.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235323165643961353337636664333934653838326165336166613566 Dec 13 02:04:01.228000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:01.228000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:01.228000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:01.228000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:01.228000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:01.228000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:01.228000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:01.228000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:01.228000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:01.228000 audit: BPF prog-id=119 op=LOAD Dec 13 02:04:01.228000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000293018 items=0 ppid=2036 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:01.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235323165643961353337636664333934653838326165336166613566 Dec 13 02:04:01.232000 audit: BPF prog-id=119 op=UNLOAD Dec 13 02:04:01.232000 audit: BPF prog-id=118 op=UNLOAD Dec 13 02:04:01.232000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:01.232000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:01.232000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:01.232000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:01.232000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:01.232000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:01.232000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:01.232000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:01.232000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:01.232000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:01.232000 audit: BPF prog-id=120 op=LOAD Dec 13 02:04:01.232000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000293428 items=0 ppid=2036 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:01.232000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235323165643961353337636664333934653838326165336166613566 Dec 13 02:04:01.270425 env[1201]: time="2024-12-13T02:04:01.270348335Z" level=info msg="StartContainer for \"b521ed9a537cfd394e882ae3afa5f3f990deae8e1ed48fc8e8d0e4504b14c796\" returns successfully" Dec 13 02:04:01.743737 kubelet[1930]: I1213 02:04:01.743667 1930 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-76c4976dd7-szd8n" podStartSLOduration=1.683483121 podStartE2EDuration="6.743652027s" podCreationTimestamp="2024-12-13 02:03:55 +0000 UTC" firstStartedPulling="2024-12-13 02:03:56.108784173 +0000 UTC m=+6.480990465" lastFinishedPulling="2024-12-13 02:04:01.168953079 +0000 UTC m=+11.541159371" observedRunningTime="2024-12-13 02:04:01.74351112 +0000 UTC m=+12.115717412" watchObservedRunningTime="2024-12-13 02:04:01.743652027 +0000 UTC m=+12.115858320" Dec 13 02:04:03.939000 audit[2317]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2317 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:04:03.939000 audit[2317]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe15d82fd0 a2=0 a3=7ffe15d82fbc items=0 ppid=2114 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:03.939000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:04:03.944000 audit[2317]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2317 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:04:03.944000 audit[2317]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe15d82fd0 a2=0 a3=0 items=0 ppid=2114 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:03.944000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:04:03.955000 audit[2319]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2319 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:04:03.955000 audit[2319]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe8aec6020 a2=0 a3=7ffe8aec600c items=0 ppid=2114 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:03.955000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:04:03.963000 audit[2319]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2319 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:04:03.963000 audit[2319]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe8aec6020 a2=0 a3=0 items=0 ppid=2114 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:03.963000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:04:04.076382 systemd[1]: Created slice kubepods-besteffort-pod24a70dc5_d89b_47b7_b514_8f2f132f9b6a.slice. Dec 13 02:04:04.083952 kubelet[1930]: I1213 02:04:04.083902 1930 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/24a70dc5-d89b-47b7-b514-8f2f132f9b6a-tigera-ca-bundle\") pod \"calico-typha-8558d9654c-hdnb9\" (UID: \"24a70dc5-d89b-47b7-b514-8f2f132f9b6a\") " pod="calico-system/calico-typha-8558d9654c-hdnb9" Dec 13 02:04:04.084285 kubelet[1930]: I1213 02:04:04.084047 1930 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-q9867\" (UniqueName: \"kubernetes.io/projected/24a70dc5-d89b-47b7-b514-8f2f132f9b6a-kube-api-access-q9867\") pod \"calico-typha-8558d9654c-hdnb9\" (UID: \"24a70dc5-d89b-47b7-b514-8f2f132f9b6a\") " pod="calico-system/calico-typha-8558d9654c-hdnb9" Dec 13 02:04:04.084285 kubelet[1930]: I1213 02:04:04.084069 1930 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/24a70dc5-d89b-47b7-b514-8f2f132f9b6a-typha-certs\") pod \"calico-typha-8558d9654c-hdnb9\" (UID: \"24a70dc5-d89b-47b7-b514-8f2f132f9b6a\") " pod="calico-system/calico-typha-8558d9654c-hdnb9" Dec 13 02:04:04.133223 systemd[1]: Created slice kubepods-besteffort-pod3bd57942_9387_4508_8d34_346abdb42b3a.slice. Dec 13 02:04:04.184442 kubelet[1930]: I1213 02:04:04.184383 1930 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/3bd57942-9387-4508-8d34-346abdb42b3a-tigera-ca-bundle\") pod \"calico-node-qr4bd\" (UID: \"3bd57942-9387-4508-8d34-346abdb42b3a\") " pod="calico-system/calico-node-qr4bd" Dec 13 02:04:04.184442 kubelet[1930]: I1213 02:04:04.184431 1930 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/3bd57942-9387-4508-8d34-346abdb42b3a-cni-log-dir\") pod \"calico-node-qr4bd\" (UID: \"3bd57942-9387-4508-8d34-346abdb42b3a\") " pod="calico-system/calico-node-qr4bd" Dec 13 02:04:04.184442 kubelet[1930]: I1213 02:04:04.184455 1930 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/3bd57942-9387-4508-8d34-346abdb42b3a-cni-net-dir\") pod \"calico-node-qr4bd\" (UID: \"3bd57942-9387-4508-8d34-346abdb42b3a\") " pod="calico-system/calico-node-qr4bd" Dec 13 02:04:04.184737 kubelet[1930]: I1213 02:04:04.184485 1930 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/3bd57942-9387-4508-8d34-346abdb42b3a-var-lib-calico\") pod \"calico-node-qr4bd\" (UID: \"3bd57942-9387-4508-8d34-346abdb42b3a\") " pod="calico-system/calico-node-qr4bd" Dec 13 02:04:04.184737 kubelet[1930]: I1213 02:04:04.184499 1930 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/3bd57942-9387-4508-8d34-346abdb42b3a-lib-modules\") pod \"calico-node-qr4bd\" (UID: \"3bd57942-9387-4508-8d34-346abdb42b3a\") " pod="calico-system/calico-node-qr4bd" Dec 13 02:04:04.184737 kubelet[1930]: I1213 02:04:04.184513 1930 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/3bd57942-9387-4508-8d34-346abdb42b3a-xtables-lock\") pod \"calico-node-qr4bd\" (UID: \"3bd57942-9387-4508-8d34-346abdb42b3a\") " pod="calico-system/calico-node-qr4bd" Dec 13 02:04:04.184737 kubelet[1930]: I1213 02:04:04.184525 1930 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9pbjv\" (UniqueName: \"kubernetes.io/projected/3bd57942-9387-4508-8d34-346abdb42b3a-kube-api-access-9pbjv\") pod \"calico-node-qr4bd\" (UID: \"3bd57942-9387-4508-8d34-346abdb42b3a\") " pod="calico-system/calico-node-qr4bd" Dec 13 02:04:04.184737 kubelet[1930]: I1213 02:04:04.184551 1930 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/3bd57942-9387-4508-8d34-346abdb42b3a-node-certs\") pod \"calico-node-qr4bd\" (UID: \"3bd57942-9387-4508-8d34-346abdb42b3a\") " pod="calico-system/calico-node-qr4bd" Dec 13 02:04:04.184911 kubelet[1930]: I1213 02:04:04.184568 1930 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/3bd57942-9387-4508-8d34-346abdb42b3a-var-run-calico\") pod \"calico-node-qr4bd\" (UID: \"3bd57942-9387-4508-8d34-346abdb42b3a\") " pod="calico-system/calico-node-qr4bd" Dec 13 02:04:04.184911 kubelet[1930]: I1213 02:04:04.184580 1930 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/3bd57942-9387-4508-8d34-346abdb42b3a-cni-bin-dir\") pod \"calico-node-qr4bd\" (UID: \"3bd57942-9387-4508-8d34-346abdb42b3a\") " pod="calico-system/calico-node-qr4bd" Dec 13 02:04:04.184911 kubelet[1930]: I1213 02:04:04.184592 1930 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/3bd57942-9387-4508-8d34-346abdb42b3a-policysync\") pod \"calico-node-qr4bd\" (UID: \"3bd57942-9387-4508-8d34-346abdb42b3a\") " pod="calico-system/calico-node-qr4bd" Dec 13 02:04:04.184911 kubelet[1930]: I1213 02:04:04.184603 1930 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/3bd57942-9387-4508-8d34-346abdb42b3a-flexvol-driver-host\") pod \"calico-node-qr4bd\" (UID: \"3bd57942-9387-4508-8d34-346abdb42b3a\") " pod="calico-system/calico-node-qr4bd" Dec 13 02:04:04.235180 kubelet[1930]: E1213 02:04:04.235015 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-559bn" podUID="691da589-3611-4441-99b1-bbdb62900b38" Dec 13 02:04:04.290238 kubelet[1930]: E1213 02:04:04.289150 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.290238 kubelet[1930]: W1213 02:04:04.289204 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.290238 kubelet[1930]: E1213 02:04:04.289247 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.290238 kubelet[1930]: E1213 02:04:04.289527 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.290238 kubelet[1930]: W1213 02:04:04.289536 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.290238 kubelet[1930]: E1213 02:04:04.289545 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.294336 kubelet[1930]: E1213 02:04:04.294302 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.294476 kubelet[1930]: W1213 02:04:04.294456 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.294729 kubelet[1930]: E1213 02:04:04.294630 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.300409 kubelet[1930]: E1213 02:04:04.300376 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.300409 kubelet[1930]: W1213 02:04:04.300396 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.300614 kubelet[1930]: E1213 02:04:04.300466 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.302832 kubelet[1930]: E1213 02:04:04.302815 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.302886 kubelet[1930]: W1213 02:04:04.302829 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.302916 kubelet[1930]: E1213 02:04:04.302887 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.303086 kubelet[1930]: E1213 02:04:04.303069 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.303086 kubelet[1930]: W1213 02:04:04.303083 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.303147 kubelet[1930]: E1213 02:04:04.303106 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.303271 kubelet[1930]: E1213 02:04:04.303257 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.303271 kubelet[1930]: W1213 02:04:04.303268 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.303332 kubelet[1930]: E1213 02:04:04.303291 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.303463 kubelet[1930]: E1213 02:04:04.303449 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.303463 kubelet[1930]: W1213 02:04:04.303459 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.303527 kubelet[1930]: E1213 02:04:04.303476 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.303667 kubelet[1930]: E1213 02:04:04.303654 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.303667 kubelet[1930]: W1213 02:04:04.303664 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.303727 kubelet[1930]: E1213 02:04:04.303671 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.303874 kubelet[1930]: E1213 02:04:04.303860 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.304062 kubelet[1930]: W1213 02:04:04.303877 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.304062 kubelet[1930]: E1213 02:04:04.303884 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.386255 kubelet[1930]: E1213 02:04:04.386195 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:04:04.386645 kubelet[1930]: E1213 02:04:04.386612 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.386705 kubelet[1930]: W1213 02:04:04.386642 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.386705 kubelet[1930]: E1213 02:04:04.386673 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.386775 kubelet[1930]: I1213 02:04:04.386702 1930 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/691da589-3611-4441-99b1-bbdb62900b38-registration-dir\") pod \"csi-node-driver-559bn\" (UID: \"691da589-3611-4441-99b1-bbdb62900b38\") " pod="calico-system/csi-node-driver-559bn" Dec 13 02:04:04.386851 env[1201]: time="2024-12-13T02:04:04.386740388Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-8558d9654c-hdnb9,Uid:24a70dc5-d89b-47b7-b514-8f2f132f9b6a,Namespace:calico-system,Attempt:0,}" Dec 13 02:04:04.387176 kubelet[1930]: E1213 02:04:04.387014 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.387176 kubelet[1930]: W1213 02:04:04.387028 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.387176 kubelet[1930]: E1213 02:04:04.387040 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.387176 kubelet[1930]: I1213 02:04:04.387056 1930 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/691da589-3611-4441-99b1-bbdb62900b38-varrun\") pod \"csi-node-driver-559bn\" (UID: \"691da589-3611-4441-99b1-bbdb62900b38\") " pod="calico-system/csi-node-driver-559bn" Dec 13 02:04:04.387367 kubelet[1930]: E1213 02:04:04.387351 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.387367 kubelet[1930]: W1213 02:04:04.387364 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.387452 kubelet[1930]: E1213 02:04:04.387383 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.387452 kubelet[1930]: I1213 02:04:04.387404 1930 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fpw54\" (UniqueName: \"kubernetes.io/projected/691da589-3611-4441-99b1-bbdb62900b38-kube-api-access-fpw54\") pod \"csi-node-driver-559bn\" (UID: \"691da589-3611-4441-99b1-bbdb62900b38\") " pod="calico-system/csi-node-driver-559bn" Dec 13 02:04:04.387739 kubelet[1930]: E1213 02:04:04.387713 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.387739 kubelet[1930]: W1213 02:04:04.387730 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.387839 kubelet[1930]: E1213 02:04:04.387758 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.387839 kubelet[1930]: I1213 02:04:04.387782 1930 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/691da589-3611-4441-99b1-bbdb62900b38-socket-dir\") pod \"csi-node-driver-559bn\" (UID: \"691da589-3611-4441-99b1-bbdb62900b38\") " pod="calico-system/csi-node-driver-559bn" Dec 13 02:04:04.388101 kubelet[1930]: E1213 02:04:04.388069 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.388101 kubelet[1930]: W1213 02:04:04.388090 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.388208 kubelet[1930]: E1213 02:04:04.388114 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.388208 kubelet[1930]: I1213 02:04:04.388139 1930 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/691da589-3611-4441-99b1-bbdb62900b38-kubelet-dir\") pod \"csi-node-driver-559bn\" (UID: \"691da589-3611-4441-99b1-bbdb62900b38\") " pod="calico-system/csi-node-driver-559bn" Dec 13 02:04:04.388551 kubelet[1930]: E1213 02:04:04.388502 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.388551 kubelet[1930]: W1213 02:04:04.388523 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.388551 kubelet[1930]: E1213 02:04:04.388548 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.388792 kubelet[1930]: E1213 02:04:04.388765 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.388792 kubelet[1930]: W1213 02:04:04.388779 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.388889 kubelet[1930]: E1213 02:04:04.388840 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.389009 kubelet[1930]: E1213 02:04:04.388974 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.389009 kubelet[1930]: W1213 02:04:04.388998 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.389110 kubelet[1930]: E1213 02:04:04.389063 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.389248 kubelet[1930]: E1213 02:04:04.389219 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.389248 kubelet[1930]: W1213 02:04:04.389233 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.389461 kubelet[1930]: E1213 02:04:04.389324 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.389510 kubelet[1930]: E1213 02:04:04.389483 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.389510 kubelet[1930]: W1213 02:04:04.389494 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.389591 kubelet[1930]: E1213 02:04:04.389547 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.389800 kubelet[1930]: E1213 02:04:04.389769 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.389800 kubelet[1930]: W1213 02:04:04.389784 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.389985 kubelet[1930]: E1213 02:04:04.389848 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.389985 kubelet[1930]: E1213 02:04:04.389933 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.389985 kubelet[1930]: W1213 02:04:04.389941 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.389985 kubelet[1930]: E1213 02:04:04.389950 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.390172 kubelet[1930]: E1213 02:04:04.390154 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.390172 kubelet[1930]: W1213 02:04:04.390166 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.390172 kubelet[1930]: E1213 02:04:04.390175 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.390430 kubelet[1930]: E1213 02:04:04.390410 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.390430 kubelet[1930]: W1213 02:04:04.390425 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.390517 kubelet[1930]: E1213 02:04:04.390436 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.390733 kubelet[1930]: E1213 02:04:04.390706 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.390733 kubelet[1930]: W1213 02:04:04.390726 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.390835 kubelet[1930]: E1213 02:04:04.390744 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.406507 env[1201]: time="2024-12-13T02:04:04.406413221Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:04:04.406652 env[1201]: time="2024-12-13T02:04:04.406556067Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:04:04.406652 env[1201]: time="2024-12-13T02:04:04.406606615Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:04:04.406998 env[1201]: time="2024-12-13T02:04:04.406950891Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/56b525ea80dc69b13cd6d405dd191b075ff309fc7d08b4f097263fbb79f5135a pid=2357 runtime=io.containerd.runc.v2 Dec 13 02:04:04.422229 systemd[1]: Started cri-containerd-56b525ea80dc69b13cd6d405dd191b075ff309fc7d08b4f097263fbb79f5135a.scope. Dec 13 02:04:04.435604 kubelet[1930]: E1213 02:04:04.435544 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:04:04.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.435000 audit: BPF prog-id=121 op=LOAD Dec 13 02:04:04.436000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.436000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=2357 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:04.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536623532356561383064633639623133636436643430356464313931 Dec 13 02:04:04.436000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.436000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=2357 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:04.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536623532356561383064633639623133636436643430356464313931 Dec 13 02:04:04.436000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.436000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.436000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.436000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.436000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.436000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.436000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.436000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.436000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.436000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.436000 audit: BPF prog-id=122 op=LOAD Dec 13 02:04:04.436000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c59d8 a2=78 a3=c00010d850 items=0 ppid=2357 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:04.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536623532356561383064633639623133636436643430356464313931 Dec 13 02:04:04.436000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.436000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.436000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.436000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.436000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.436000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.436000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.436000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.436000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.436000 audit: BPF prog-id=123 op=LOAD Dec 13 02:04:04.436000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001c5770 a2=78 a3=c00010d898 items=0 ppid=2357 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:04.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536623532356561383064633639623133636436643430356464313931 Dec 13 02:04:04.436000 audit: BPF prog-id=123 op=UNLOAD Dec 13 02:04:04.436000 audit: BPF prog-id=122 op=UNLOAD Dec 13 02:04:04.436000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.436000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.436000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.436000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.436000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.436000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.436000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.436000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.436000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.436000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.436000 audit: BPF prog-id=124 op=LOAD Dec 13 02:04:04.436000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c5c30 a2=78 a3=c00010dca8 items=0 ppid=2357 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:04.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536623532356561383064633639623133636436643430356464313931 Dec 13 02:04:04.476317 env[1201]: time="2024-12-13T02:04:04.436065609Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-qr4bd,Uid:3bd57942-9387-4508-8d34-346abdb42b3a,Namespace:calico-system,Attempt:0,}" Dec 13 02:04:04.476317 env[1201]: time="2024-12-13T02:04:04.461953051Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-8558d9654c-hdnb9,Uid:24a70dc5-d89b-47b7-b514-8f2f132f9b6a,Namespace:calico-system,Attempt:0,} returns sandbox id \"56b525ea80dc69b13cd6d405dd191b075ff309fc7d08b4f097263fbb79f5135a\"" Dec 13 02:04:04.476317 env[1201]: time="2024-12-13T02:04:04.463394782Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 02:04:04.476425 kubelet[1930]: E1213 02:04:04.462646 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:04:04.489215 kubelet[1930]: E1213 02:04:04.489093 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.489215 kubelet[1930]: W1213 02:04:04.489117 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.489215 kubelet[1930]: E1213 02:04:04.489138 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.489447 kubelet[1930]: E1213 02:04:04.489429 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.489447 kubelet[1930]: W1213 02:04:04.489442 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.489536 kubelet[1930]: E1213 02:04:04.489460 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.490030 kubelet[1930]: E1213 02:04:04.489984 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.490030 kubelet[1930]: W1213 02:04:04.490030 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.490148 kubelet[1930]: E1213 02:04:04.490042 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.490493 kubelet[1930]: E1213 02:04:04.490408 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.490493 kubelet[1930]: W1213 02:04:04.490468 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.490493 kubelet[1930]: E1213 02:04:04.490480 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.490812 kubelet[1930]: E1213 02:04:04.490748 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.490812 kubelet[1930]: W1213 02:04:04.490794 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.490912 kubelet[1930]: E1213 02:04:04.490865 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.491132 kubelet[1930]: E1213 02:04:04.491114 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.491132 kubelet[1930]: W1213 02:04:04.491130 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.491243 kubelet[1930]: E1213 02:04:04.491210 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.491421 kubelet[1930]: E1213 02:04:04.491403 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.491421 kubelet[1930]: W1213 02:04:04.491416 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.491529 kubelet[1930]: E1213 02:04:04.491460 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.491564 kubelet[1930]: E1213 02:04:04.491555 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.491564 kubelet[1930]: W1213 02:04:04.491563 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.491641 kubelet[1930]: E1213 02:04:04.491584 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.491729 kubelet[1930]: E1213 02:04:04.491712 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.491729 kubelet[1930]: W1213 02:04:04.491723 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.491819 kubelet[1930]: E1213 02:04:04.491736 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.491917 kubelet[1930]: E1213 02:04:04.491900 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.491917 kubelet[1930]: W1213 02:04:04.491911 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.491917 kubelet[1930]: E1213 02:04:04.491925 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.492271 kubelet[1930]: E1213 02:04:04.492133 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.492271 kubelet[1930]: W1213 02:04:04.492147 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.492271 kubelet[1930]: E1213 02:04:04.492216 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.492469 kubelet[1930]: E1213 02:04:04.492445 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.492469 kubelet[1930]: W1213 02:04:04.492466 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.492469 kubelet[1930]: E1213 02:04:04.492507 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.492628 kubelet[1930]: E1213 02:04:04.492591 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.492628 kubelet[1930]: W1213 02:04:04.492599 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.492687 kubelet[1930]: E1213 02:04:04.492629 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.492776 kubelet[1930]: E1213 02:04:04.492760 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.492776 kubelet[1930]: W1213 02:04:04.492771 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.492862 kubelet[1930]: E1213 02:04:04.492792 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.492951 kubelet[1930]: E1213 02:04:04.492935 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.492951 kubelet[1930]: W1213 02:04:04.492946 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.493046 kubelet[1930]: E1213 02:04:04.492970 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.493129 kubelet[1930]: E1213 02:04:04.493112 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.493129 kubelet[1930]: W1213 02:04:04.493124 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.493236 kubelet[1930]: E1213 02:04:04.493136 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.493384 kubelet[1930]: E1213 02:04:04.493361 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.493384 kubelet[1930]: W1213 02:04:04.493380 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.493479 kubelet[1930]: E1213 02:04:04.493400 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.494132 kubelet[1930]: E1213 02:04:04.494055 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.494132 kubelet[1930]: W1213 02:04:04.494069 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.494132 kubelet[1930]: E1213 02:04:04.494084 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.494344 kubelet[1930]: E1213 02:04:04.494329 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.494344 kubelet[1930]: W1213 02:04:04.494341 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.494402 kubelet[1930]: E1213 02:04:04.494384 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.494556 kubelet[1930]: E1213 02:04:04.494532 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.494556 kubelet[1930]: W1213 02:04:04.494545 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.494626 kubelet[1930]: E1213 02:04:04.494597 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.494766 kubelet[1930]: E1213 02:04:04.494750 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.494766 kubelet[1930]: W1213 02:04:04.494760 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.494973 kubelet[1930]: E1213 02:04:04.494821 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.494973 kubelet[1930]: E1213 02:04:04.494913 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.494973 kubelet[1930]: W1213 02:04:04.494919 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.495039 kubelet[1930]: E1213 02:04:04.494996 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.495100 kubelet[1930]: E1213 02:04:04.495085 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.495130 kubelet[1930]: W1213 02:04:04.495098 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.495130 kubelet[1930]: E1213 02:04:04.495115 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.495351 kubelet[1930]: E1213 02:04:04.495336 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.495351 kubelet[1930]: W1213 02:04:04.495347 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.495420 kubelet[1930]: E1213 02:04:04.495361 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.495582 kubelet[1930]: E1213 02:04:04.495554 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.495582 kubelet[1930]: W1213 02:04:04.495579 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.495670 kubelet[1930]: E1213 02:04:04.495588 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.503883 kubelet[1930]: E1213 02:04:04.503851 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.503883 kubelet[1930]: W1213 02:04:04.503874 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.503989 kubelet[1930]: E1213 02:04:04.503895 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.787152 env[1201]: time="2024-12-13T02:04:04.786971426Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:04:04.787152 env[1201]: time="2024-12-13T02:04:04.787012263Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:04:04.787152 env[1201]: time="2024-12-13T02:04:04.787022715Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:04:04.787461 env[1201]: time="2024-12-13T02:04:04.787198831Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2292bba15cb9854d16436798f67d0e0c46681688a900426928010e6301571111 pid=2427 runtime=io.containerd.runc.v2 Dec 13 02:04:04.797945 systemd[1]: Started cri-containerd-2292bba15cb9854d16436798f67d0e0c46681688a900426928010e6301571111.scope. Dec 13 02:04:04.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.808000 audit: BPF prog-id=125 op=LOAD Dec 13 02:04:04.808000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.808000 audit[2436]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2427 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:04.808000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232393262626131356362393835346431363433363739386636376430 Dec 13 02:04:04.808000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.808000 audit[2436]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2427 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:04.808000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232393262626131356362393835346431363433363739386636376430 Dec 13 02:04:04.808000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.808000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.808000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.808000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.808000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.808000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.808000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.808000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.808000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.808000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.808000 audit: BPF prog-id=126 op=LOAD Dec 13 02:04:04.808000 audit[2436]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00020b780 items=0 ppid=2427 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:04.808000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232393262626131356362393835346431363433363739386636376430 Dec 13 02:04:04.808000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.808000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.808000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.808000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.808000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.808000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.808000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.808000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.808000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.808000 audit: BPF prog-id=127 op=LOAD Dec 13 02:04:04.808000 audit[2436]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00020b7c8 items=0 ppid=2427 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:04.808000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232393262626131356362393835346431363433363739386636376430 Dec 13 02:04:04.809000 audit: BPF prog-id=127 op=UNLOAD Dec 13 02:04:04.809000 audit: BPF prog-id=126 op=UNLOAD Dec 13 02:04:04.809000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.809000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.809000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.809000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.809000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.809000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.809000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.809000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.809000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.809000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:04.809000 audit: BPF prog-id=128 op=LOAD Dec 13 02:04:04.809000 audit[2436]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00020bbd8 items=0 ppid=2427 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:04.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232393262626131356362393835346431363433363739386636376430 Dec 13 02:04:04.819318 env[1201]: time="2024-12-13T02:04:04.819263854Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-qr4bd,Uid:3bd57942-9387-4508-8d34-346abdb42b3a,Namespace:calico-system,Attempt:0,} returns sandbox id \"2292bba15cb9854d16436798f67d0e0c46681688a900426928010e6301571111\"" Dec 13 02:04:04.819887 kubelet[1930]: E1213 02:04:04.819855 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:04:04.958936 kubelet[1930]: E1213 02:04:04.958671 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:04:04.975000 audit[2461]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2461 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:04:04.975000 audit[2461]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7fff8f8344e0 a2=0 a3=7fff8f8344cc items=0 ppid=2114 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:04.975000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:04:04.981000 audit[2461]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2461 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:04:04.981000 audit[2461]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff8f8344e0 a2=0 a3=0 items=0 ppid=2114 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:04.981000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:04:04.989642 kubelet[1930]: E1213 02:04:04.989593 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.989642 kubelet[1930]: W1213 02:04:04.989629 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.989782 kubelet[1930]: E1213 02:04:04.989655 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.989905 kubelet[1930]: E1213 02:04:04.989881 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.989905 kubelet[1930]: W1213 02:04:04.989895 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.989976 kubelet[1930]: E1213 02:04:04.989905 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.990112 kubelet[1930]: E1213 02:04:04.990088 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.990112 kubelet[1930]: W1213 02:04:04.990102 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.990112 kubelet[1930]: E1213 02:04:04.990112 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.990376 kubelet[1930]: E1213 02:04:04.990337 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.990376 kubelet[1930]: W1213 02:04:04.990351 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.990376 kubelet[1930]: E1213 02:04:04.990360 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.990586 kubelet[1930]: E1213 02:04:04.990559 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.990586 kubelet[1930]: W1213 02:04:04.990574 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.990586 kubelet[1930]: E1213 02:04:04.990586 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.990772 kubelet[1930]: E1213 02:04:04.990756 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.990772 kubelet[1930]: W1213 02:04:04.990768 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.990857 kubelet[1930]: E1213 02:04:04.990779 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.990945 kubelet[1930]: E1213 02:04:04.990930 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.990945 kubelet[1930]: W1213 02:04:04.990941 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.991028 kubelet[1930]: E1213 02:04:04.990953 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.991127 kubelet[1930]: E1213 02:04:04.991112 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.991127 kubelet[1930]: W1213 02:04:04.991123 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.991248 kubelet[1930]: E1213 02:04:04.991133 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.991331 kubelet[1930]: E1213 02:04:04.991316 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.991331 kubelet[1930]: W1213 02:04:04.991327 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.991418 kubelet[1930]: E1213 02:04:04.991338 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.991493 kubelet[1930]: E1213 02:04:04.991478 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.991493 kubelet[1930]: W1213 02:04:04.991490 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.991577 kubelet[1930]: E1213 02:04:04.991499 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.991663 kubelet[1930]: E1213 02:04:04.991648 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.991663 kubelet[1930]: W1213 02:04:04.991660 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.991758 kubelet[1930]: E1213 02:04:04.991669 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.991843 kubelet[1930]: E1213 02:04:04.991828 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.991843 kubelet[1930]: W1213 02:04:04.991840 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.991924 kubelet[1930]: E1213 02:04:04.991850 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.992020 kubelet[1930]: E1213 02:04:04.992005 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.992020 kubelet[1930]: W1213 02:04:04.992016 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.992109 kubelet[1930]: E1213 02:04:04.992026 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.992196 kubelet[1930]: E1213 02:04:04.992171 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.992252 kubelet[1930]: W1213 02:04:04.992202 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.992252 kubelet[1930]: E1213 02:04:04.992214 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:04.992373 kubelet[1930]: E1213 02:04:04.992358 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:04.992373 kubelet[1930]: W1213 02:04:04.992369 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:04.992452 kubelet[1930]: E1213 02:04:04.992378 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:05.703116 kubelet[1930]: E1213 02:04:05.703072 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-559bn" podUID="691da589-3611-4441-99b1-bbdb62900b38" Dec 13 02:04:07.704329 kubelet[1930]: E1213 02:04:07.704045 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-559bn" podUID="691da589-3611-4441-99b1-bbdb62900b38" Dec 13 02:04:08.177302 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount455491243.mount: Deactivated successfully. Dec 13 02:04:08.898706 env[1201]: time="2024-12-13T02:04:08.898629807Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:08.901154 env[1201]: time="2024-12-13T02:04:08.901117278Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:08.903028 env[1201]: time="2024-12-13T02:04:08.902988017Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:08.904599 env[1201]: time="2024-12-13T02:04:08.904561684Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:08.904994 env[1201]: time="2024-12-13T02:04:08.904957203Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\"" Dec 13 02:04:08.906562 env[1201]: time="2024-12-13T02:04:08.906031453Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 02:04:08.912502 env[1201]: time="2024-12-13T02:04:08.912438726Z" level=info msg="CreateContainer within sandbox \"56b525ea80dc69b13cd6d405dd191b075ff309fc7d08b4f097263fbb79f5135a\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 02:04:08.927854 env[1201]: time="2024-12-13T02:04:08.927745965Z" level=info msg="CreateContainer within sandbox \"56b525ea80dc69b13cd6d405dd191b075ff309fc7d08b4f097263fbb79f5135a\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"eaa7094aefbb67afbe5ea807c5c52cb5abffa380f4ec7045f0a414433a12e39b\"" Dec 13 02:04:08.928467 env[1201]: time="2024-12-13T02:04:08.928430239Z" level=info msg="StartContainer for \"eaa7094aefbb67afbe5ea807c5c52cb5abffa380f4ec7045f0a414433a12e39b\"" Dec 13 02:04:08.948642 systemd[1]: Started cri-containerd-eaa7094aefbb67afbe5ea807c5c52cb5abffa380f4ec7045f0a414433a12e39b.scope. Dec 13 02:04:08.981358 kernel: kauditd_printk_skb: 179 callbacks suppressed Dec 13 02:04:08.981584 kernel: audit: type=1400 audit(1734055448.965:967): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.981639 kernel: audit: type=1400 audit(1734055448.965:968): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.981678 kernel: audit: type=1400 audit(1734055448.965:969): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.982266 kernel: audit: type=1400 audit(1734055448.965:970): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.990616 kernel: audit: type=1400 audit(1734055448.965:971): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.990774 kernel: audit: type=1400 audit(1734055448.965:972): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.999492 kernel: audit: type=1400 audit(1734055448.965:973): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.999663 kernel: audit: type=1400 audit(1734055448.965:974): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.006485 kernel: audit: type=1400 audit(1734055448.965:975): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:09.006630 kernel: audit: type=1400 audit(1734055448.967:976): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.967000 audit: BPF prog-id=129 op=LOAD Dec 13 02:04:08.967000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.967000 audit[2486]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2357 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:08.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561613730393461656662623637616662653565613830376335633532 Dec 13 02:04:08.967000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.967000 audit[2486]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2357 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:08.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561613730393461656662623637616662653565613830376335633532 Dec 13 02:04:08.967000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.967000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.967000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.967000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.967000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.967000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.967000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.967000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.967000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.967000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.967000 audit: BPF prog-id=130 op=LOAD Dec 13 02:04:08.967000 audit[2486]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000228eb0 items=0 ppid=2357 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:08.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561613730393461656662623637616662653565613830376335633532 Dec 13 02:04:08.972000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.972000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.972000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.972000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.972000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.972000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.972000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.972000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.972000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.972000 audit: BPF prog-id=131 op=LOAD Dec 13 02:04:08.972000 audit[2486]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000228ef8 items=0 ppid=2357 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:08.972000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561613730393461656662623637616662653565613830376335633532 Dec 13 02:04:08.976000 audit: BPF prog-id=131 op=UNLOAD Dec 13 02:04:08.976000 audit: BPF prog-id=130 op=UNLOAD Dec 13 02:04:08.976000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.976000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.976000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.976000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.976000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.976000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.976000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.976000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.976000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.976000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:08.976000 audit: BPF prog-id=132 op=LOAD Dec 13 02:04:08.976000 audit[2486]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000229308 items=0 ppid=2357 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:08.976000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561613730393461656662623637616662653565613830376335633532 Dec 13 02:04:09.123274 env[1201]: time="2024-12-13T02:04:09.123204944Z" level=info msg="StartContainer for \"eaa7094aefbb67afbe5ea807c5c52cb5abffa380f4ec7045f0a414433a12e39b\" returns successfully" Dec 13 02:04:09.706217 kubelet[1930]: E1213 02:04:09.703991 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-559bn" podUID="691da589-3611-4441-99b1-bbdb62900b38" Dec 13 02:04:09.753735 kubelet[1930]: E1213 02:04:09.753667 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:04:09.826693 kubelet[1930]: E1213 02:04:09.826628 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:09.826693 kubelet[1930]: W1213 02:04:09.826663 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:09.826693 kubelet[1930]: E1213 02:04:09.826691 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:09.827004 kubelet[1930]: E1213 02:04:09.826917 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:09.827004 kubelet[1930]: W1213 02:04:09.826929 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:09.827004 kubelet[1930]: E1213 02:04:09.826941 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:09.827149 kubelet[1930]: E1213 02:04:09.827126 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:09.827149 kubelet[1930]: W1213 02:04:09.827140 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:09.827279 kubelet[1930]: E1213 02:04:09.827150 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:09.827468 kubelet[1930]: E1213 02:04:09.827429 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:09.827468 kubelet[1930]: W1213 02:04:09.827462 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:09.827573 kubelet[1930]: E1213 02:04:09.827474 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:09.827726 kubelet[1930]: E1213 02:04:09.827684 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:09.827726 kubelet[1930]: W1213 02:04:09.827717 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:09.827816 kubelet[1930]: E1213 02:04:09.827727 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:09.827919 kubelet[1930]: E1213 02:04:09.827906 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:09.827919 kubelet[1930]: W1213 02:04:09.827918 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:09.827991 kubelet[1930]: E1213 02:04:09.827927 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:09.828133 kubelet[1930]: E1213 02:04:09.828113 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:09.828133 kubelet[1930]: W1213 02:04:09.828125 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:09.828244 kubelet[1930]: E1213 02:04:09.828137 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:09.828341 kubelet[1930]: E1213 02:04:09.828327 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:09.828384 kubelet[1930]: W1213 02:04:09.828341 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:09.828384 kubelet[1930]: E1213 02:04:09.828351 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:09.828547 kubelet[1930]: E1213 02:04:09.828532 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:09.828547 kubelet[1930]: W1213 02:04:09.828543 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:09.828630 kubelet[1930]: E1213 02:04:09.828552 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:09.828739 kubelet[1930]: E1213 02:04:09.828725 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:09.828739 kubelet[1930]: W1213 02:04:09.828737 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:09.828811 kubelet[1930]: E1213 02:04:09.828747 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:09.828938 kubelet[1930]: E1213 02:04:09.828924 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:09.828938 kubelet[1930]: W1213 02:04:09.828936 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:09.829017 kubelet[1930]: E1213 02:04:09.828945 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:09.829158 kubelet[1930]: E1213 02:04:09.829145 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:09.829214 kubelet[1930]: W1213 02:04:09.829157 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:09.829214 kubelet[1930]: E1213 02:04:09.829167 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:09.829430 kubelet[1930]: E1213 02:04:09.829416 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:09.829430 kubelet[1930]: W1213 02:04:09.829428 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:09.829512 kubelet[1930]: E1213 02:04:09.829438 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:09.829630 kubelet[1930]: E1213 02:04:09.829616 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:09.829630 kubelet[1930]: W1213 02:04:09.829627 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:09.829713 kubelet[1930]: E1213 02:04:09.829636 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:09.829846 kubelet[1930]: E1213 02:04:09.829833 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:09.829846 kubelet[1930]: W1213 02:04:09.829845 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:09.829925 kubelet[1930]: E1213 02:04:09.829855 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:09.830132 kubelet[1930]: E1213 02:04:09.830116 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:09.830132 kubelet[1930]: W1213 02:04:09.830128 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:09.830249 kubelet[1930]: E1213 02:04:09.830138 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:09.830367 kubelet[1930]: E1213 02:04:09.830352 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:09.830367 kubelet[1930]: W1213 02:04:09.830364 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:09.830439 kubelet[1930]: E1213 02:04:09.830380 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:09.830610 kubelet[1930]: E1213 02:04:09.830578 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:09.830610 kubelet[1930]: W1213 02:04:09.830593 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:09.830723 kubelet[1930]: E1213 02:04:09.830612 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:09.830847 kubelet[1930]: E1213 02:04:09.830831 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:09.830931 kubelet[1930]: W1213 02:04:09.830846 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:09.830931 kubelet[1930]: E1213 02:04:09.830869 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:09.831088 kubelet[1930]: E1213 02:04:09.831069 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:09.831088 kubelet[1930]: W1213 02:04:09.831082 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:09.831218 kubelet[1930]: E1213 02:04:09.831104 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:09.831315 kubelet[1930]: E1213 02:04:09.831300 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:09.831315 kubelet[1930]: W1213 02:04:09.831312 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:09.831403 kubelet[1930]: E1213 02:04:09.831329 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:09.831546 kubelet[1930]: E1213 02:04:09.831530 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:09.831546 kubelet[1930]: W1213 02:04:09.831541 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:09.831640 kubelet[1930]: E1213 02:04:09.831569 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:09.832096 kubelet[1930]: E1213 02:04:09.832075 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:09.832096 kubelet[1930]: W1213 02:04:09.832091 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:09.832357 kubelet[1930]: E1213 02:04:09.832130 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:09.832357 kubelet[1930]: E1213 02:04:09.832345 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:09.832357 kubelet[1930]: W1213 02:04:09.832355 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:09.832478 kubelet[1930]: E1213 02:04:09.832384 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:09.832562 kubelet[1930]: E1213 02:04:09.832546 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:09.832562 kubelet[1930]: W1213 02:04:09.832557 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:09.832651 kubelet[1930]: E1213 02:04:09.832572 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:09.832788 kubelet[1930]: E1213 02:04:09.832773 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:09.832788 kubelet[1930]: W1213 02:04:09.832784 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:09.832878 kubelet[1930]: E1213 02:04:09.832799 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:09.832992 kubelet[1930]: E1213 02:04:09.832976 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:09.832992 kubelet[1930]: W1213 02:04:09.832987 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:09.833074 kubelet[1930]: E1213 02:04:09.833004 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:09.833335 kubelet[1930]: E1213 02:04:09.833297 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:09.833400 kubelet[1930]: W1213 02:04:09.833332 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:09.833400 kubelet[1930]: E1213 02:04:09.833368 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:09.833576 kubelet[1930]: E1213 02:04:09.833559 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:09.833576 kubelet[1930]: W1213 02:04:09.833570 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:09.833647 kubelet[1930]: E1213 02:04:09.833582 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:09.833816 kubelet[1930]: E1213 02:04:09.833799 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:09.833816 kubelet[1930]: W1213 02:04:09.833810 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:09.833890 kubelet[1930]: E1213 02:04:09.833823 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:09.834032 kubelet[1930]: E1213 02:04:09.834016 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:09.834077 kubelet[1930]: W1213 02:04:09.834031 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:09.834077 kubelet[1930]: E1213 02:04:09.834049 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:09.834327 kubelet[1930]: E1213 02:04:09.834309 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:09.834327 kubelet[1930]: W1213 02:04:09.834321 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:09.834411 kubelet[1930]: E1213 02:04:09.834335 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:09.834532 kubelet[1930]: E1213 02:04:09.834517 1930 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:04:09.834532 kubelet[1930]: W1213 02:04:09.834527 1930 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:04:09.834532 kubelet[1930]: E1213 02:04:09.834534 1930 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:04:10.327351 env[1201]: time="2024-12-13T02:04:10.327281546Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:10.329376 env[1201]: time="2024-12-13T02:04:10.329319189Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:10.331036 env[1201]: time="2024-12-13T02:04:10.330965991Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:10.332546 env[1201]: time="2024-12-13T02:04:10.332500439Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:10.333092 env[1201]: time="2024-12-13T02:04:10.333052907Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 02:04:10.335488 env[1201]: time="2024-12-13T02:04:10.335442162Z" level=info msg="CreateContainer within sandbox \"2292bba15cb9854d16436798f67d0e0c46681688a900426928010e6301571111\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 02:04:10.353282 env[1201]: time="2024-12-13T02:04:10.353165659Z" level=info msg="CreateContainer within sandbox \"2292bba15cb9854d16436798f67d0e0c46681688a900426928010e6301571111\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"f77b92ed1fc79ef2c934228d6314168f9c6448e485ac779a4563c69f04343f98\"" Dec 13 02:04:10.353737 env[1201]: time="2024-12-13T02:04:10.353696291Z" level=info msg="StartContainer for \"f77b92ed1fc79ef2c934228d6314168f9c6448e485ac779a4563c69f04343f98\"" Dec 13 02:04:10.376811 systemd[1]: Started cri-containerd-f77b92ed1fc79ef2c934228d6314168f9c6448e485ac779a4563c69f04343f98.scope. Dec 13 02:04:10.406000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:10.406000 audit[2558]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fc9285c3ac8 items=0 ppid=2427 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:10.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637376239326564316663373965663263393334323238643633313431 Dec 13 02:04:10.406000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:10.406000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:10.406000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:10.406000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:10.406000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:10.406000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:10.406000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:10.406000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:10.406000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:10.406000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:10.406000 audit: BPF prog-id=133 op=LOAD Dec 13 02:04:10.406000 audit[2558]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0002d3ba8 items=0 ppid=2427 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:10.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637376239326564316663373965663263393334323238643633313431 Dec 13 02:04:10.407000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:10.407000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:10.407000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:10.407000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:10.407000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:10.407000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:10.407000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:10.407000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:10.407000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:10.407000 audit: BPF prog-id=134 op=LOAD Dec 13 02:04:10.407000 audit[2558]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0002d3bf8 items=0 ppid=2427 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:10.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637376239326564316663373965663263393334323238643633313431 Dec 13 02:04:10.407000 audit: BPF prog-id=134 op=UNLOAD Dec 13 02:04:10.407000 audit: BPF prog-id=133 op=UNLOAD Dec 13 02:04:10.407000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:10.407000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:10.407000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:10.407000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:10.407000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:10.407000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:10.407000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:10.407000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:10.407000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:10.407000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:10.407000 audit: BPF prog-id=135 op=LOAD Dec 13 02:04:10.407000 audit[2558]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0002d3c88 items=0 ppid=2427 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:10.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637376239326564316663373965663263393334323238643633313431 Dec 13 02:04:10.430448 systemd[1]: cri-containerd-f77b92ed1fc79ef2c934228d6314168f9c6448e485ac779a4563c69f04343f98.scope: Deactivated successfully. Dec 13 02:04:10.433000 audit: BPF prog-id=135 op=UNLOAD Dec 13 02:04:10.673158 env[1201]: time="2024-12-13T02:04:10.672992739Z" level=info msg="StartContainer for \"f77b92ed1fc79ef2c934228d6314168f9c6448e485ac779a4563c69f04343f98\" returns successfully" Dec 13 02:04:10.689453 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-f77b92ed1fc79ef2c934228d6314168f9c6448e485ac779a4563c69f04343f98-rootfs.mount: Deactivated successfully. Dec 13 02:04:10.756338 kubelet[1930]: I1213 02:04:10.756303 1930 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 02:04:10.757795 kubelet[1930]: E1213 02:04:10.756605 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:04:10.757795 kubelet[1930]: E1213 02:04:10.756699 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:04:10.878380 env[1201]: time="2024-12-13T02:04:10.878302501Z" level=info msg="shim disconnected" id=f77b92ed1fc79ef2c934228d6314168f9c6448e485ac779a4563c69f04343f98 Dec 13 02:04:10.878792 env[1201]: time="2024-12-13T02:04:10.878616925Z" level=warning msg="cleaning up after shim disconnected" id=f77b92ed1fc79ef2c934228d6314168f9c6448e485ac779a4563c69f04343f98 namespace=k8s.io Dec 13 02:04:10.878792 env[1201]: time="2024-12-13T02:04:10.878645874Z" level=info msg="cleaning up dead shim" Dec 13 02:04:10.879038 kubelet[1930]: I1213 02:04:10.878864 1930 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-8558d9654c-hdnb9" podStartSLOduration=2.436080306 podStartE2EDuration="6.878844988s" podCreationTimestamp="2024-12-13 02:04:04 +0000 UTC" firstStartedPulling="2024-12-13 02:04:04.463081904 +0000 UTC m=+14.835288196" lastFinishedPulling="2024-12-13 02:04:08.905846566 +0000 UTC m=+19.278052878" observedRunningTime="2024-12-13 02:04:09.763619947 +0000 UTC m=+20.135826240" watchObservedRunningTime="2024-12-13 02:04:10.878844988 +0000 UTC m=+21.251051280" Dec 13 02:04:10.885911 env[1201]: time="2024-12-13T02:04:10.885854563Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:04:10Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2601 runtime=io.containerd.runc.v2\n" Dec 13 02:04:11.703298 kubelet[1930]: E1213 02:04:11.703235 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-559bn" podUID="691da589-3611-4441-99b1-bbdb62900b38" Dec 13 02:04:11.759738 kubelet[1930]: E1213 02:04:11.759683 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:04:11.760743 env[1201]: time="2024-12-13T02:04:11.760691359Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 02:04:13.703275 kubelet[1930]: E1213 02:04:13.703205 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-559bn" podUID="691da589-3611-4441-99b1-bbdb62900b38" Dec 13 02:04:15.702845 kubelet[1930]: E1213 02:04:15.702772 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-559bn" podUID="691da589-3611-4441-99b1-bbdb62900b38" Dec 13 02:04:17.703248 kubelet[1930]: E1213 02:04:17.703098 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-559bn" podUID="691da589-3611-4441-99b1-bbdb62900b38" Dec 13 02:04:19.703603 kubelet[1930]: E1213 02:04:19.703527 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-559bn" podUID="691da589-3611-4441-99b1-bbdb62900b38" Dec 13 02:04:20.659499 env[1201]: time="2024-12-13T02:04:20.659437297Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:20.662082 env[1201]: time="2024-12-13T02:04:20.662043488Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:20.664114 env[1201]: time="2024-12-13T02:04:20.664075801Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:20.665603 env[1201]: time="2024-12-13T02:04:20.665573544Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:20.666086 env[1201]: time="2024-12-13T02:04:20.666053914Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 02:04:20.667999 env[1201]: time="2024-12-13T02:04:20.667959591Z" level=info msg="CreateContainer within sandbox \"2292bba15cb9854d16436798f67d0e0c46681688a900426928010e6301571111\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 02:04:20.685227 env[1201]: time="2024-12-13T02:04:20.685143279Z" level=info msg="CreateContainer within sandbox \"2292bba15cb9854d16436798f67d0e0c46681688a900426928010e6301571111\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"cdbe9d5c73dda04c12c3ea54ce9663a47193cea3f75da99269ae8e45d6d2032f\"" Dec 13 02:04:20.685801 env[1201]: time="2024-12-13T02:04:20.685742368Z" level=info msg="StartContainer for \"cdbe9d5c73dda04c12c3ea54ce9663a47193cea3f75da99269ae8e45d6d2032f\"" Dec 13 02:04:20.711218 systemd[1]: Started cri-containerd-cdbe9d5c73dda04c12c3ea54ce9663a47193cea3f75da99269ae8e45d6d2032f.scope. Dec 13 02:04:20.724000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.729172 kernel: kauditd_printk_skb: 91 callbacks suppressed Dec 13 02:04:20.729251 kernel: audit: type=1400 audit(1734055460.724:992): avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.729278 kernel: audit: type=1300 audit(1734055460.724:992): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fc3d52a6b18 items=0 ppid=2427 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:20.724000 audit[2624]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fc3d52a6b18 items=0 ppid=2427 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:20.724000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364626539643563373364646130346331326333656135346365393636 Dec 13 02:04:20.737918 kernel: audit: type=1327 audit(1734055460.724:992): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364626539643563373364646130346331326333656135346365393636 Dec 13 02:04:20.737968 kernel: audit: type=1400 audit(1734055460.724:993): avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.724000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.724000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.743872 kernel: audit: type=1400 audit(1734055460.724:993): avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.743917 kernel: audit: type=1400 audit(1734055460.724:993): avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.724000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.746627 kernel: audit: type=1400 audit(1734055460.724:993): avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.724000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.749550 kernel: audit: type=1400 audit(1734055460.724:993): avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.724000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.752862 kernel: audit: type=1400 audit(1734055460.724:993): avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.724000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.724000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.758512 kernel: audit: type=1400 audit(1734055460.724:993): avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.724000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.724000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.724000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.724000 audit: BPF prog-id=136 op=LOAD Dec 13 02:04:20.724000 audit[2624]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000290a58 items=0 ppid=2427 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:20.724000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364626539643563373364646130346331326333656135346365393636 Dec 13 02:04:20.728000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.728000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.728000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.728000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.728000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.728000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.728000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.728000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.728000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.728000 audit: BPF prog-id=137 op=LOAD Dec 13 02:04:20.728000 audit[2624]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000290aa8 items=0 ppid=2427 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:20.728000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364626539643563373364646130346331326333656135346365393636 Dec 13 02:04:20.732000 audit: BPF prog-id=137 op=UNLOAD Dec 13 02:04:20.732000 audit: BPF prog-id=136 op=UNLOAD Dec 13 02:04:20.732000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.732000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.732000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.732000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.732000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.732000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.732000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.732000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.732000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.732000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:20.732000 audit: BPF prog-id=138 op=LOAD Dec 13 02:04:20.732000 audit[2624]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000290b38 items=0 ppid=2427 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:20.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364626539643563373364646130346331326333656135346365393636 Dec 13 02:04:20.802992 env[1201]: time="2024-12-13T02:04:20.802917529Z" level=info msg="StartContainer for \"cdbe9d5c73dda04c12c3ea54ce9663a47193cea3f75da99269ae8e45d6d2032f\" returns successfully" Dec 13 02:04:21.807692 kubelet[1930]: E1213 02:04:21.807649 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:04:21.873546 kubelet[1930]: E1213 02:04:21.873464 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-559bn" podUID="691da589-3611-4441-99b1-bbdb62900b38" Dec 13 02:04:22.037145 env[1201]: time="2024-12-13T02:04:22.037053697Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 02:04:22.039469 systemd[1]: cri-containerd-cdbe9d5c73dda04c12c3ea54ce9663a47193cea3f75da99269ae8e45d6d2032f.scope: Deactivated successfully. Dec 13 02:04:22.044000 audit: BPF prog-id=138 op=UNLOAD Dec 13 02:04:22.058612 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-cdbe9d5c73dda04c12c3ea54ce9663a47193cea3f75da99269ae8e45d6d2032f-rootfs.mount: Deactivated successfully. Dec 13 02:04:22.060668 env[1201]: time="2024-12-13T02:04:22.060602339Z" level=info msg="shim disconnected" id=cdbe9d5c73dda04c12c3ea54ce9663a47193cea3f75da99269ae8e45d6d2032f Dec 13 02:04:22.060668 env[1201]: time="2024-12-13T02:04:22.060657499Z" level=warning msg="cleaning up after shim disconnected" id=cdbe9d5c73dda04c12c3ea54ce9663a47193cea3f75da99269ae8e45d6d2032f namespace=k8s.io Dec 13 02:04:22.060668 env[1201]: time="2024-12-13T02:04:22.060669874Z" level=info msg="cleaning up dead shim" Dec 13 02:04:22.067958 env[1201]: time="2024-12-13T02:04:22.067899482Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:04:22Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2665 runtime=io.containerd.runc.v2\n" Dec 13 02:04:22.081555 kubelet[1930]: I1213 02:04:22.081528 1930 kubelet_node_status.go:488] "Fast updating node status as it just became ready" Dec 13 02:04:22.114962 systemd[1]: Created slice kubepods-burstable-podf1443aa5_1d21_4afb_99f6_5788e787fa3a.slice. Dec 13 02:04:22.121777 systemd[1]: Created slice kubepods-besteffort-pode2aa5408_7118_4e83_b2a0_4139d9b8393c.slice. Dec 13 02:04:22.130204 kubelet[1930]: I1213 02:04:22.130133 1930 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/0d1882a6-9d8f-43ef-958e-b21696c8b1a8-config-volume\") pod \"coredns-6f6b679f8f-9zn6q\" (UID: \"0d1882a6-9d8f-43ef-958e-b21696c8b1a8\") " pod="kube-system/coredns-6f6b679f8f-9zn6q" Dec 13 02:04:22.130204 kubelet[1930]: I1213 02:04:22.130175 1930 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xtlsj\" (UniqueName: \"kubernetes.io/projected/f86c03bf-e3cf-46e2-8f7c-974a2bb1f8e6-kube-api-access-xtlsj\") pod \"calico-apiserver-844858f88f-xpmjh\" (UID: \"f86c03bf-e3cf-46e2-8f7c-974a2bb1f8e6\") " pod="calico-apiserver/calico-apiserver-844858f88f-xpmjh" Dec 13 02:04:22.130386 kubelet[1930]: I1213 02:04:22.130216 1930 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7jg6w\" (UniqueName: \"kubernetes.io/projected/0d1882a6-9d8f-43ef-958e-b21696c8b1a8-kube-api-access-7jg6w\") pod \"coredns-6f6b679f8f-9zn6q\" (UID: \"0d1882a6-9d8f-43ef-958e-b21696c8b1a8\") " pod="kube-system/coredns-6f6b679f8f-9zn6q" Dec 13 02:04:22.130386 kubelet[1930]: I1213 02:04:22.130231 1930 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/f86c03bf-e3cf-46e2-8f7c-974a2bb1f8e6-calico-apiserver-certs\") pod \"calico-apiserver-844858f88f-xpmjh\" (UID: \"f86c03bf-e3cf-46e2-8f7c-974a2bb1f8e6\") " pod="calico-apiserver/calico-apiserver-844858f88f-xpmjh" Dec 13 02:04:22.130386 kubelet[1930]: I1213 02:04:22.130247 1930 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/f1443aa5-1d21-4afb-99f6-5788e787fa3a-config-volume\") pod \"coredns-6f6b679f8f-wgzqb\" (UID: \"f1443aa5-1d21-4afb-99f6-5788e787fa3a\") " pod="kube-system/coredns-6f6b679f8f-wgzqb" Dec 13 02:04:22.130386 kubelet[1930]: I1213 02:04:22.130259 1930 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wdbbj\" (UniqueName: \"kubernetes.io/projected/f1443aa5-1d21-4afb-99f6-5788e787fa3a-kube-api-access-wdbbj\") pod \"coredns-6f6b679f8f-wgzqb\" (UID: \"f1443aa5-1d21-4afb-99f6-5788e787fa3a\") " pod="kube-system/coredns-6f6b679f8f-wgzqb" Dec 13 02:04:22.130386 kubelet[1930]: I1213 02:04:22.130274 1930 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/da007ed8-1e90-41d5-a725-d1c3c3736c1f-tigera-ca-bundle\") pod \"calico-kube-controllers-6f7685584c-tn7w2\" (UID: \"da007ed8-1e90-41d5-a725-d1c3c3736c1f\") " pod="calico-system/calico-kube-controllers-6f7685584c-tn7w2" Dec 13 02:04:22.130351 systemd[1]: Created slice kubepods-burstable-pod0d1882a6_9d8f_43ef_958e_b21696c8b1a8.slice. Dec 13 02:04:22.130639 kubelet[1930]: I1213 02:04:22.130289 1930 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/e2aa5408-7118-4e83-b2a0-4139d9b8393c-calico-apiserver-certs\") pod \"calico-apiserver-844858f88f-dcngr\" (UID: \"e2aa5408-7118-4e83-b2a0-4139d9b8393c\") " pod="calico-apiserver/calico-apiserver-844858f88f-dcngr" Dec 13 02:04:22.130639 kubelet[1930]: I1213 02:04:22.130304 1930 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-b8nlp\" (UniqueName: \"kubernetes.io/projected/da007ed8-1e90-41d5-a725-d1c3c3736c1f-kube-api-access-b8nlp\") pod \"calico-kube-controllers-6f7685584c-tn7w2\" (UID: \"da007ed8-1e90-41d5-a725-d1c3c3736c1f\") " pod="calico-system/calico-kube-controllers-6f7685584c-tn7w2" Dec 13 02:04:22.130639 kubelet[1930]: I1213 02:04:22.130319 1930 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qlt48\" (UniqueName: \"kubernetes.io/projected/e2aa5408-7118-4e83-b2a0-4139d9b8393c-kube-api-access-qlt48\") pod \"calico-apiserver-844858f88f-dcngr\" (UID: \"e2aa5408-7118-4e83-b2a0-4139d9b8393c\") " pod="calico-apiserver/calico-apiserver-844858f88f-dcngr" Dec 13 02:04:22.135269 systemd[1]: Created slice kubepods-besteffort-podf86c03bf_e3cf_46e2_8f7c_974a2bb1f8e6.slice. Dec 13 02:04:22.139368 systemd[1]: Created slice kubepods-besteffort-podda007ed8_1e90_41d5_a725_d1c3c3736c1f.slice. Dec 13 02:04:22.420178 kubelet[1930]: E1213 02:04:22.420013 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:04:22.420969 env[1201]: time="2024-12-13T02:04:22.420905281Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-wgzqb,Uid:f1443aa5-1d21-4afb-99f6-5788e787fa3a,Namespace:kube-system,Attempt:0,}" Dec 13 02:04:22.427522 env[1201]: time="2024-12-13T02:04:22.427464480Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-844858f88f-dcngr,Uid:e2aa5408-7118-4e83-b2a0-4139d9b8393c,Namespace:calico-apiserver,Attempt:0,}" Dec 13 02:04:22.433953 kubelet[1930]: E1213 02:04:22.433900 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:04:22.434473 env[1201]: time="2024-12-13T02:04:22.434414805Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-9zn6q,Uid:0d1882a6-9d8f-43ef-958e-b21696c8b1a8,Namespace:kube-system,Attempt:0,}" Dec 13 02:04:22.437887 env[1201]: time="2024-12-13T02:04:22.437848750Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-844858f88f-xpmjh,Uid:f86c03bf-e3cf-46e2-8f7c-974a2bb1f8e6,Namespace:calico-apiserver,Attempt:0,}" Dec 13 02:04:22.441728 env[1201]: time="2024-12-13T02:04:22.441692861Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6f7685584c-tn7w2,Uid:da007ed8-1e90-41d5-a725-d1c3c3736c1f,Namespace:calico-system,Attempt:0,}" Dec 13 02:04:22.568763 env[1201]: time="2024-12-13T02:04:22.568692259Z" level=error msg="Failed to destroy network for sandbox \"82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:04:22.569320 env[1201]: time="2024-12-13T02:04:22.569291845Z" level=error msg="encountered an error cleaning up failed sandbox \"82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:04:22.569477 env[1201]: time="2024-12-13T02:04:22.569433790Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-9zn6q,Uid:0d1882a6-9d8f-43ef-958e-b21696c8b1a8,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:04:22.569934 kubelet[1930]: E1213 02:04:22.569747 1930 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:04:22.569934 kubelet[1930]: E1213 02:04:22.569818 1930 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-9zn6q" Dec 13 02:04:22.569934 kubelet[1930]: E1213 02:04:22.569839 1930 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-9zn6q" Dec 13 02:04:22.570064 kubelet[1930]: E1213 02:04:22.569890 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-9zn6q_kube-system(0d1882a6-9d8f-43ef-958e-b21696c8b1a8)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-9zn6q_kube-system(0d1882a6-9d8f-43ef-958e-b21696c8b1a8)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-9zn6q" podUID="0d1882a6-9d8f-43ef-958e-b21696c8b1a8" Dec 13 02:04:22.574816 env[1201]: time="2024-12-13T02:04:22.574735381Z" level=error msg="Failed to destroy network for sandbox \"0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:04:22.575248 env[1201]: time="2024-12-13T02:04:22.575204083Z" level=error msg="encountered an error cleaning up failed sandbox \"0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:04:22.575319 env[1201]: time="2024-12-13T02:04:22.575280657Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-844858f88f-dcngr,Uid:e2aa5408-7118-4e83-b2a0-4139d9b8393c,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:04:22.575539 kubelet[1930]: E1213 02:04:22.575487 1930 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:04:22.575598 kubelet[1930]: E1213 02:04:22.575546 1930 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-844858f88f-dcngr" Dec 13 02:04:22.575598 kubelet[1930]: E1213 02:04:22.575565 1930 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-844858f88f-dcngr" Dec 13 02:04:22.575648 kubelet[1930]: E1213 02:04:22.575598 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-844858f88f-dcngr_calico-apiserver(e2aa5408-7118-4e83-b2a0-4139d9b8393c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-844858f88f-dcngr_calico-apiserver(e2aa5408-7118-4e83-b2a0-4139d9b8393c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-844858f88f-dcngr" podUID="e2aa5408-7118-4e83-b2a0-4139d9b8393c" Dec 13 02:04:22.583914 env[1201]: time="2024-12-13T02:04:22.583840379Z" level=error msg="Failed to destroy network for sandbox \"594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:04:22.584306 env[1201]: time="2024-12-13T02:04:22.584277367Z" level=error msg="encountered an error cleaning up failed sandbox \"594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:04:22.584350 env[1201]: time="2024-12-13T02:04:22.584327879Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-wgzqb,Uid:f1443aa5-1d21-4afb-99f6-5788e787fa3a,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:04:22.584626 kubelet[1930]: E1213 02:04:22.584582 1930 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:04:22.584684 kubelet[1930]: E1213 02:04:22.584653 1930 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-wgzqb" Dec 13 02:04:22.584717 kubelet[1930]: E1213 02:04:22.584683 1930 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-wgzqb" Dec 13 02:04:22.584758 kubelet[1930]: E1213 02:04:22.584729 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-wgzqb_kube-system(f1443aa5-1d21-4afb-99f6-5788e787fa3a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-wgzqb_kube-system(f1443aa5-1d21-4afb-99f6-5788e787fa3a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-wgzqb" podUID="f1443aa5-1d21-4afb-99f6-5788e787fa3a" Dec 13 02:04:22.590557 env[1201]: time="2024-12-13T02:04:22.590505921Z" level=error msg="Failed to destroy network for sandbox \"a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:04:22.590949 env[1201]: time="2024-12-13T02:04:22.590896086Z" level=error msg="encountered an error cleaning up failed sandbox \"a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:04:22.590949 env[1201]: time="2024-12-13T02:04:22.590945806Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-844858f88f-xpmjh,Uid:f86c03bf-e3cf-46e2-8f7c-974a2bb1f8e6,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:04:22.591267 kubelet[1930]: E1213 02:04:22.591113 1930 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:04:22.591267 kubelet[1930]: E1213 02:04:22.591170 1930 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-844858f88f-xpmjh" Dec 13 02:04:22.591267 kubelet[1930]: E1213 02:04:22.591202 1930 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-844858f88f-xpmjh" Dec 13 02:04:22.591388 kubelet[1930]: E1213 02:04:22.591246 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-844858f88f-xpmjh_calico-apiserver(f86c03bf-e3cf-46e2-8f7c-974a2bb1f8e6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-844858f88f-xpmjh_calico-apiserver(f86c03bf-e3cf-46e2-8f7c-974a2bb1f8e6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-844858f88f-xpmjh" podUID="f86c03bf-e3cf-46e2-8f7c-974a2bb1f8e6" Dec 13 02:04:22.604234 env[1201]: time="2024-12-13T02:04:22.604138163Z" level=error msg="Failed to destroy network for sandbox \"6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:04:22.604660 env[1201]: time="2024-12-13T02:04:22.604613770Z" level=error msg="encountered an error cleaning up failed sandbox \"6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:04:22.604712 env[1201]: time="2024-12-13T02:04:22.604671615Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6f7685584c-tn7w2,Uid:da007ed8-1e90-41d5-a725-d1c3c3736c1f,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:04:22.605009 kubelet[1930]: E1213 02:04:22.604959 1930 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:04:22.605090 kubelet[1930]: E1213 02:04:22.605034 1930 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6f7685584c-tn7w2" Dec 13 02:04:22.605090 kubelet[1930]: E1213 02:04:22.605053 1930 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6f7685584c-tn7w2" Dec 13 02:04:22.605151 kubelet[1930]: E1213 02:04:22.605105 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-6f7685584c-tn7w2_calico-system(da007ed8-1e90-41d5-a725-d1c3c3736c1f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-6f7685584c-tn7w2_calico-system(da007ed8-1e90-41d5-a725-d1c3c3736c1f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6f7685584c-tn7w2" podUID="da007ed8-1e90-41d5-a725-d1c3c3736c1f" Dec 13 02:04:22.810022 kubelet[1930]: I1213 02:04:22.809987 1930 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76" Dec 13 02:04:22.810702 env[1201]: time="2024-12-13T02:04:22.810649062Z" level=info msg="StopPodSandbox for \"6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76\"" Dec 13 02:04:22.810986 kubelet[1930]: I1213 02:04:22.810824 1930 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd" Dec 13 02:04:22.811423 env[1201]: time="2024-12-13T02:04:22.811388740Z" level=info msg="StopPodSandbox for \"594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd\"" Dec 13 02:04:22.812545 kubelet[1930]: I1213 02:04:22.812462 1930 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37" Dec 13 02:04:22.813246 env[1201]: time="2024-12-13T02:04:22.813144230Z" level=info msg="StopPodSandbox for \"82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37\"" Dec 13 02:04:22.814259 kubelet[1930]: E1213 02:04:22.814238 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:04:22.816252 env[1201]: time="2024-12-13T02:04:22.816218652Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 02:04:22.816876 kubelet[1930]: I1213 02:04:22.816844 1930 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47" Dec 13 02:04:22.817587 env[1201]: time="2024-12-13T02:04:22.817558015Z" level=info msg="StopPodSandbox for \"0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47\"" Dec 13 02:04:22.819230 kubelet[1930]: I1213 02:04:22.818851 1930 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8" Dec 13 02:04:22.819470 env[1201]: time="2024-12-13T02:04:22.819438206Z" level=info msg="StopPodSandbox for \"a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8\"" Dec 13 02:04:22.849563 env[1201]: time="2024-12-13T02:04:22.849492839Z" level=error msg="StopPodSandbox for \"6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76\" failed" error="failed to destroy network for sandbox \"6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:04:22.850075 kubelet[1930]: E1213 02:04:22.850016 1930 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76" Dec 13 02:04:22.850177 kubelet[1930]: E1213 02:04:22.850093 1930 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76"} Dec 13 02:04:22.850246 kubelet[1930]: E1213 02:04:22.850173 1930 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"da007ed8-1e90-41d5-a725-d1c3c3736c1f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:04:22.850326 kubelet[1930]: E1213 02:04:22.850249 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"da007ed8-1e90-41d5-a725-d1c3c3736c1f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6f7685584c-tn7w2" podUID="da007ed8-1e90-41d5-a725-d1c3c3736c1f" Dec 13 02:04:22.857167 env[1201]: time="2024-12-13T02:04:22.857088643Z" level=error msg="StopPodSandbox for \"594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd\" failed" error="failed to destroy network for sandbox \"594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:04:22.857420 kubelet[1930]: E1213 02:04:22.857365 1930 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd" Dec 13 02:04:22.857511 kubelet[1930]: E1213 02:04:22.857426 1930 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd"} Dec 13 02:04:22.857511 kubelet[1930]: E1213 02:04:22.857485 1930 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f1443aa5-1d21-4afb-99f6-5788e787fa3a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:04:22.857630 kubelet[1930]: E1213 02:04:22.857514 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f1443aa5-1d21-4afb-99f6-5788e787fa3a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-wgzqb" podUID="f1443aa5-1d21-4afb-99f6-5788e787fa3a" Dec 13 02:04:22.860315 env[1201]: time="2024-12-13T02:04:22.860248065Z" level=error msg="StopPodSandbox for \"82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37\" failed" error="failed to destroy network for sandbox \"82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:04:22.860739 kubelet[1930]: E1213 02:04:22.860709 1930 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37" Dec 13 02:04:22.860832 kubelet[1930]: E1213 02:04:22.860742 1930 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37"} Dec 13 02:04:22.860832 kubelet[1930]: E1213 02:04:22.860771 1930 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0d1882a6-9d8f-43ef-958e-b21696c8b1a8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:04:22.860832 kubelet[1930]: E1213 02:04:22.860792 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0d1882a6-9d8f-43ef-958e-b21696c8b1a8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-9zn6q" podUID="0d1882a6-9d8f-43ef-958e-b21696c8b1a8" Dec 13 02:04:22.864720 env[1201]: time="2024-12-13T02:04:22.864656390Z" level=error msg="StopPodSandbox for \"0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47\" failed" error="failed to destroy network for sandbox \"0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:04:22.864872 kubelet[1930]: E1213 02:04:22.864836 1930 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47" Dec 13 02:04:22.864954 kubelet[1930]: E1213 02:04:22.864879 1930 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47"} Dec 13 02:04:22.864954 kubelet[1930]: E1213 02:04:22.864911 1930 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e2aa5408-7118-4e83-b2a0-4139d9b8393c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:04:22.865060 kubelet[1930]: E1213 02:04:22.864940 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e2aa5408-7118-4e83-b2a0-4139d9b8393c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-844858f88f-dcngr" podUID="e2aa5408-7118-4e83-b2a0-4139d9b8393c" Dec 13 02:04:22.872369 env[1201]: time="2024-12-13T02:04:22.872310220Z" level=error msg="StopPodSandbox for \"a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8\" failed" error="failed to destroy network for sandbox \"a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:04:22.872563 kubelet[1930]: E1213 02:04:22.872514 1930 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8" Dec 13 02:04:22.872635 kubelet[1930]: E1213 02:04:22.872564 1930 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8"} Dec 13 02:04:22.872635 kubelet[1930]: E1213 02:04:22.872596 1930 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f86c03bf-e3cf-46e2-8f7c-974a2bb1f8e6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:04:22.872635 kubelet[1930]: E1213 02:04:22.872620 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f86c03bf-e3cf-46e2-8f7c-974a2bb1f8e6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-844858f88f-xpmjh" podUID="f86c03bf-e3cf-46e2-8f7c-974a2bb1f8e6" Dec 13 02:04:23.708405 systemd[1]: Created slice kubepods-besteffort-pod691da589_3611_4441_99b1_bbdb62900b38.slice. Dec 13 02:04:23.710128 env[1201]: time="2024-12-13T02:04:23.710064614Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-559bn,Uid:691da589-3611-4441-99b1-bbdb62900b38,Namespace:calico-system,Attempt:0,}" Dec 13 02:04:23.865420 env[1201]: time="2024-12-13T02:04:23.865338311Z" level=error msg="Failed to destroy network for sandbox \"b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:04:23.865833 env[1201]: time="2024-12-13T02:04:23.865796079Z" level=error msg="encountered an error cleaning up failed sandbox \"b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:04:23.865960 env[1201]: time="2024-12-13T02:04:23.865849035Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-559bn,Uid:691da589-3611-4441-99b1-bbdb62900b38,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:04:23.866216 kubelet[1930]: E1213 02:04:23.866149 1930 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:04:23.866469 kubelet[1930]: E1213 02:04:23.866242 1930 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-559bn" Dec 13 02:04:23.866469 kubelet[1930]: E1213 02:04:23.866262 1930 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-559bn" Dec 13 02:04:23.866469 kubelet[1930]: E1213 02:04:23.866306 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-559bn_calico-system(691da589-3611-4441-99b1-bbdb62900b38)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-559bn_calico-system(691da589-3611-4441-99b1-bbdb62900b38)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-559bn" podUID="691da589-3611-4441-99b1-bbdb62900b38" Dec 13 02:04:23.868211 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8-shm.mount: Deactivated successfully. Dec 13 02:04:24.835693 kubelet[1930]: I1213 02:04:24.835601 1930 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8" Dec 13 02:04:24.841131 env[1201]: time="2024-12-13T02:04:24.841053138Z" level=info msg="StopPodSandbox for \"b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8\"" Dec 13 02:04:24.946840 env[1201]: time="2024-12-13T02:04:24.946749336Z" level=error msg="StopPodSandbox for \"b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8\" failed" error="failed to destroy network for sandbox \"b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:04:24.947218 kubelet[1930]: E1213 02:04:24.947036 1930 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8" Dec 13 02:04:24.947602 kubelet[1930]: E1213 02:04:24.947241 1930 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8"} Dec 13 02:04:24.947602 kubelet[1930]: E1213 02:04:24.947292 1930 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"691da589-3611-4441-99b1-bbdb62900b38\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:04:24.947602 kubelet[1930]: E1213 02:04:24.947322 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"691da589-3611-4441-99b1-bbdb62900b38\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-559bn" podUID="691da589-3611-4441-99b1-bbdb62900b38" Dec 13 02:04:25.578461 systemd[1]: Started sshd@7-10.0.0.95:22-10.0.0.1:49728.service. Dec 13 02:04:25.578000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.95:22-10.0.0.1:49728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:25.626000 audit[3060]: USER_ACCT pid=3060 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:25.627392 sshd[3060]: Accepted publickey for core from 10.0.0.1 port 49728 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:04:25.628000 audit[3060]: CRED_ACQ pid=3060 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:25.628000 audit[3060]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc706c0070 a2=3 a3=0 items=0 ppid=1 pid=3060 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:25.628000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:04:25.629131 sshd[3060]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:04:25.634167 systemd-logind[1186]: New session 8 of user core. Dec 13 02:04:25.635299 systemd[1]: Started session-8.scope. Dec 13 02:04:25.640000 audit[3060]: USER_START pid=3060 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:25.642000 audit[3062]: CRED_ACQ pid=3062 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:25.780825 sshd[3060]: pam_unix(sshd:session): session closed for user core Dec 13 02:04:25.781000 audit[3060]: USER_END pid=3060 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:25.783981 systemd[1]: sshd@7-10.0.0.95:22-10.0.0.1:49728.service: Deactivated successfully. Dec 13 02:04:25.784858 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 02:04:25.785606 systemd-logind[1186]: Session 8 logged out. Waiting for processes to exit. Dec 13 02:04:25.786527 systemd-logind[1186]: Removed session 8. Dec 13 02:04:25.788244 kernel: kauditd_printk_skb: 42 callbacks suppressed Dec 13 02:04:25.788331 kernel: audit: type=1106 audit(1734055465.781:1005): pid=3060 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:25.788391 kernel: audit: type=1104 audit(1734055465.782:1006): pid=3060 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:25.782000 audit[3060]: CRED_DISP pid=3060 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:25.792153 kernel: audit: type=1131 audit(1734055465.784:1007): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.95:22-10.0.0.1:49728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:25.784000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.95:22-10.0.0.1:49728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:27.668069 kubelet[1930]: I1213 02:04:27.668007 1930 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 02:04:27.668616 kubelet[1930]: E1213 02:04:27.668410 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:04:27.690000 audit[3076]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=3076 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:04:27.690000 audit[3076]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe1e143ed0 a2=0 a3=7ffe1e143ebc items=0 ppid=2114 pid=3076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:27.699812 kernel: audit: type=1325 audit(1734055467.690:1008): table=filter:95 family=2 entries=17 op=nft_register_rule pid=3076 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:04:27.699877 kernel: audit: type=1300 audit(1734055467.690:1008): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe1e143ed0 a2=0 a3=7ffe1e143ebc items=0 ppid=2114 pid=3076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:27.699901 kernel: audit: type=1327 audit(1734055467.690:1008): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:04:27.690000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:04:27.705000 audit[3076]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3076 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:04:27.705000 audit[3076]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffe1e143ed0 a2=0 a3=7ffe1e143ebc items=0 ppid=2114 pid=3076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:27.714466 kernel: audit: type=1325 audit(1734055467.705:1009): table=nat:96 family=2 entries=19 op=nft_register_chain pid=3076 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:04:27.714515 kernel: audit: type=1300 audit(1734055467.705:1009): arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffe1e143ed0 a2=0 a3=7ffe1e143ebc items=0 ppid=2114 pid=3076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:27.714536 kernel: audit: type=1327 audit(1734055467.705:1009): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:04:27.705000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:04:27.842269 kubelet[1930]: E1213 02:04:27.842235 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:04:30.786921 systemd[1]: Started sshd@8-10.0.0.95:22-10.0.0.1:51336.service. Dec 13 02:04:30.791365 kernel: audit: type=1130 audit(1734055470.785:1010): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.95:22-10.0.0.1:51336 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:30.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.95:22-10.0.0.1:51336 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:30.829000 audit[3078]: USER_ACCT pid=3078 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:30.831936 sshd[3078]: Accepted publickey for core from 10.0.0.1 port 51336 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:04:30.835000 audit[3078]: CRED_ACQ pid=3078 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:30.836878 sshd[3078]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:04:30.842486 kernel: audit: type=1101 audit(1734055470.829:1011): pid=3078 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:30.842558 kernel: audit: type=1103 audit(1734055470.835:1012): pid=3078 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:30.842588 kernel: audit: type=1006 audit(1734055470.835:1013): pid=3078 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Dec 13 02:04:30.841485 systemd-logind[1186]: New session 9 of user core. Dec 13 02:04:30.842080 systemd[1]: Started session-9.scope. Dec 13 02:04:30.835000 audit[3078]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5f957360 a2=3 a3=0 items=0 ppid=1 pid=3078 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:30.851225 kernel: audit: type=1300 audit(1734055470.835:1013): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5f957360 a2=3 a3=0 items=0 ppid=1 pid=3078 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:30.851390 kernel: audit: type=1327 audit(1734055470.835:1013): proctitle=737368643A20636F7265205B707269765D Dec 13 02:04:30.835000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:04:30.848000 audit[3078]: USER_START pid=3078 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:30.857140 kernel: audit: type=1105 audit(1734055470.848:1014): pid=3078 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:30.857237 kernel: audit: type=1103 audit(1734055470.850:1015): pid=3080 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:30.850000 audit[3080]: CRED_ACQ pid=3080 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:30.970209 sshd[3078]: pam_unix(sshd:session): session closed for user core Dec 13 02:04:30.970000 audit[3078]: USER_END pid=3078 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:30.973023 systemd[1]: sshd@8-10.0.0.95:22-10.0.0.1:51336.service: Deactivated successfully. Dec 13 02:04:30.973695 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 02:04:30.974546 systemd-logind[1186]: Session 9 logged out. Waiting for processes to exit. Dec 13 02:04:30.975472 systemd-logind[1186]: Removed session 9. Dec 13 02:04:30.970000 audit[3078]: CRED_DISP pid=3078 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:30.980550 kernel: audit: type=1106 audit(1734055470.970:1016): pid=3078 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:30.980620 kernel: audit: type=1104 audit(1734055470.970:1017): pid=3078 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:30.972000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.95:22-10.0.0.1:51336 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:33.359833 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2864860420.mount: Deactivated successfully. Dec 13 02:04:33.397910 env[1201]: time="2024-12-13T02:04:33.397845530Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:33.399870 env[1201]: time="2024-12-13T02:04:33.399837569Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:33.401529 env[1201]: time="2024-12-13T02:04:33.401464803Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:33.402995 env[1201]: time="2024-12-13T02:04:33.402960897Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:33.403385 env[1201]: time="2024-12-13T02:04:33.403338876Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 02:04:33.420618 env[1201]: time="2024-12-13T02:04:33.420563108Z" level=info msg="CreateContainer within sandbox \"2292bba15cb9854d16436798f67d0e0c46681688a900426928010e6301571111\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 02:04:33.442992 env[1201]: time="2024-12-13T02:04:33.442926115Z" level=info msg="CreateContainer within sandbox \"2292bba15cb9854d16436798f67d0e0c46681688a900426928010e6301571111\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"b1b78e00139ef1e7e992cdbe2fb445a4be4829a2ca3a0496a680a7fe7fcf4f9a\"" Dec 13 02:04:33.443645 env[1201]: time="2024-12-13T02:04:33.443572575Z" level=info msg="StartContainer for \"b1b78e00139ef1e7e992cdbe2fb445a4be4829a2ca3a0496a680a7fe7fcf4f9a\"" Dec 13 02:04:33.461612 systemd[1]: Started cri-containerd-b1b78e00139ef1e7e992cdbe2fb445a4be4829a2ca3a0496a680a7fe7fcf4f9a.scope. Dec 13 02:04:33.487000 audit[3100]: AVC avc: denied { perfmon } for pid=3100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:33.487000 audit[3100]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f4964565468 items=0 ppid=2427 pid=3100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:33.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231623738653030313339656631653765393932636462653266623434 Dec 13 02:04:33.487000 audit[3100]: AVC avc: denied { bpf } for pid=3100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:33.487000 audit[3100]: AVC avc: denied { bpf } for pid=3100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:33.487000 audit[3100]: AVC avc: denied { bpf } for pid=3100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:33.487000 audit[3100]: AVC avc: denied { perfmon } for pid=3100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:33.487000 audit[3100]: AVC avc: denied { perfmon } for pid=3100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:33.487000 audit[3100]: AVC avc: denied { perfmon } for pid=3100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:33.487000 audit[3100]: AVC avc: denied { perfmon } for pid=3100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:33.487000 audit[3100]: AVC avc: denied { perfmon } for pid=3100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:33.487000 audit[3100]: AVC avc: denied { bpf } for pid=3100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:33.487000 audit[3100]: AVC avc: denied { bpf } for pid=3100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:33.487000 audit: BPF prog-id=139 op=LOAD Dec 13 02:04:33.487000 audit[3100]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003a0598 items=0 ppid=2427 pid=3100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:33.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231623738653030313339656631653765393932636462653266623434 Dec 13 02:04:33.487000 audit[3100]: AVC avc: denied { bpf } for pid=3100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:33.487000 audit[3100]: AVC avc: denied { bpf } for pid=3100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:33.487000 audit[3100]: AVC avc: denied { perfmon } for pid=3100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:33.487000 audit[3100]: AVC avc: denied { perfmon } for pid=3100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:33.487000 audit[3100]: AVC avc: denied { perfmon } for pid=3100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:33.487000 audit[3100]: AVC avc: denied { perfmon } for pid=3100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:33.487000 audit[3100]: AVC avc: denied { perfmon } for pid=3100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:33.487000 audit[3100]: AVC avc: denied { bpf } for pid=3100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:33.487000 audit[3100]: AVC avc: denied { bpf } for pid=3100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:33.487000 audit: BPF prog-id=140 op=LOAD Dec 13 02:04:33.487000 audit[3100]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003a05e8 items=0 ppid=2427 pid=3100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:33.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231623738653030313339656631653765393932636462653266623434 Dec 13 02:04:33.487000 audit: BPF prog-id=140 op=UNLOAD Dec 13 02:04:33.487000 audit: BPF prog-id=139 op=UNLOAD Dec 13 02:04:33.487000 audit[3100]: AVC avc: denied { bpf } for pid=3100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:33.487000 audit[3100]: AVC avc: denied { bpf } for pid=3100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:33.487000 audit[3100]: AVC avc: denied { bpf } for pid=3100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:33.487000 audit[3100]: AVC avc: denied { perfmon } for pid=3100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:33.487000 audit[3100]: AVC avc: denied { perfmon } for pid=3100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:33.487000 audit[3100]: AVC avc: denied { perfmon } for pid=3100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:33.487000 audit[3100]: AVC avc: denied { perfmon } for pid=3100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:33.487000 audit[3100]: AVC avc: denied { perfmon } for pid=3100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:33.487000 audit[3100]: AVC avc: denied { bpf } for pid=3100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:33.487000 audit[3100]: AVC avc: denied { bpf } for pid=3100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:33.487000 audit: BPF prog-id=141 op=LOAD Dec 13 02:04:33.487000 audit[3100]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003a0678 items=0 ppid=2427 pid=3100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:33.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231623738653030313339656631653765393932636462653266623434 Dec 13 02:04:33.703673 env[1201]: time="2024-12-13T02:04:33.703619704Z" level=info msg="StopPodSandbox for \"594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd\"" Dec 13 02:04:33.703886 env[1201]: time="2024-12-13T02:04:33.703619854Z" level=info msg="StopPodSandbox for \"a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8\"" Dec 13 02:04:33.746141 env[1201]: time="2024-12-13T02:04:33.745765051Z" level=info msg="StartContainer for \"b1b78e00139ef1e7e992cdbe2fb445a4be4829a2ca3a0496a680a7fe7fcf4f9a\" returns successfully" Dec 13 02:04:33.752491 env[1201]: time="2024-12-13T02:04:33.752401902Z" level=error msg="StopPodSandbox for \"594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd\" failed" error="failed to destroy network for sandbox \"594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:04:33.753615 kubelet[1930]: E1213 02:04:33.752936 1930 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd" Dec 13 02:04:33.753615 kubelet[1930]: E1213 02:04:33.753003 1930 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd"} Dec 13 02:04:33.753615 kubelet[1930]: E1213 02:04:33.753046 1930 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f1443aa5-1d21-4afb-99f6-5788e787fa3a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:04:33.753615 kubelet[1930]: E1213 02:04:33.753076 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f1443aa5-1d21-4afb-99f6-5788e787fa3a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-wgzqb" podUID="f1443aa5-1d21-4afb-99f6-5788e787fa3a" Dec 13 02:04:33.762467 env[1201]: time="2024-12-13T02:04:33.762397030Z" level=error msg="StopPodSandbox for \"a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8\" failed" error="failed to destroy network for sandbox \"a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:04:33.767597 kubelet[1930]: E1213 02:04:33.762887 1930 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8" Dec 13 02:04:33.767597 kubelet[1930]: E1213 02:04:33.762950 1930 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8"} Dec 13 02:04:33.767597 kubelet[1930]: E1213 02:04:33.762992 1930 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f86c03bf-e3cf-46e2-8f7c-974a2bb1f8e6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:04:33.767597 kubelet[1930]: E1213 02:04:33.763015 1930 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f86c03bf-e3cf-46e2-8f7c-974a2bb1f8e6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-844858f88f-xpmjh" podUID="f86c03bf-e3cf-46e2-8f7c-974a2bb1f8e6" Dec 13 02:04:33.788603 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 02:04:33.788784 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 02:04:33.862421 kubelet[1930]: E1213 02:04:33.862376 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:04:33.883951 kubelet[1930]: I1213 02:04:33.883874 1930 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-qr4bd" podStartSLOduration=1.30049487 podStartE2EDuration="29.883858151s" podCreationTimestamp="2024-12-13 02:04:04 +0000 UTC" firstStartedPulling="2024-12-13 02:04:04.820754539 +0000 UTC m=+15.192960831" lastFinishedPulling="2024-12-13 02:04:33.40411782 +0000 UTC m=+43.776324112" observedRunningTime="2024-12-13 02:04:33.882809543 +0000 UTC m=+44.255015835" watchObservedRunningTime="2024-12-13 02:04:33.883858151 +0000 UTC m=+44.256064444" Dec 13 02:04:34.703310 env[1201]: time="2024-12-13T02:04:34.703244422Z" level=info msg="StopPodSandbox for \"6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76\"" Dec 13 02:04:34.703697 env[1201]: time="2024-12-13T02:04:34.703563384Z" level=info msg="StopPodSandbox for \"0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47\"" Dec 13 02:04:34.704077 env[1201]: time="2024-12-13T02:04:34.704038173Z" level=info msg="StopPodSandbox for \"82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37\"" Dec 13 02:04:34.832031 env[1201]: 2024-12-13 02:04:34.759 [INFO][3276] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37" Dec 13 02:04:34.832031 env[1201]: 2024-12-13 02:04:34.760 [INFO][3276] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37" iface="eth0" netns="/var/run/netns/cni-7892d1b6-ac4f-f44b-bd01-c1e4cc547d7e" Dec 13 02:04:34.832031 env[1201]: 2024-12-13 02:04:34.760 [INFO][3276] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37" iface="eth0" netns="/var/run/netns/cni-7892d1b6-ac4f-f44b-bd01-c1e4cc547d7e" Dec 13 02:04:34.832031 env[1201]: 2024-12-13 02:04:34.761 [INFO][3276] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37" iface="eth0" netns="/var/run/netns/cni-7892d1b6-ac4f-f44b-bd01-c1e4cc547d7e" Dec 13 02:04:34.832031 env[1201]: 2024-12-13 02:04:34.761 [INFO][3276] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37" Dec 13 02:04:34.832031 env[1201]: 2024-12-13 02:04:34.761 [INFO][3276] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37" Dec 13 02:04:34.832031 env[1201]: 2024-12-13 02:04:34.816 [INFO][3302] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37" HandleID="k8s-pod-network.82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37" Workload="localhost-k8s-coredns--6f6b679f8f--9zn6q-eth0" Dec 13 02:04:34.832031 env[1201]: 2024-12-13 02:04:34.816 [INFO][3302] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:04:34.832031 env[1201]: 2024-12-13 02:04:34.816 [INFO][3302] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:04:34.832031 env[1201]: 2024-12-13 02:04:34.824 [WARNING][3302] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37" HandleID="k8s-pod-network.82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37" Workload="localhost-k8s-coredns--6f6b679f8f--9zn6q-eth0" Dec 13 02:04:34.832031 env[1201]: 2024-12-13 02:04:34.824 [INFO][3302] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37" HandleID="k8s-pod-network.82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37" Workload="localhost-k8s-coredns--6f6b679f8f--9zn6q-eth0" Dec 13 02:04:34.832031 env[1201]: 2024-12-13 02:04:34.826 [INFO][3302] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:04:34.832031 env[1201]: 2024-12-13 02:04:34.831 [INFO][3276] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37" Dec 13 02:04:34.834446 env[1201]: time="2024-12-13T02:04:34.834405896Z" level=info msg="TearDown network for sandbox \"82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37\" successfully" Dec 13 02:04:34.834515 env[1201]: time="2024-12-13T02:04:34.834448229Z" level=info msg="StopPodSandbox for \"82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37\" returns successfully" Dec 13 02:04:34.834791 systemd[1]: run-netns-cni\x2d7892d1b6\x2dac4f\x2df44b\x2dbd01\x2dc1e4cc547d7e.mount: Deactivated successfully. Dec 13 02:04:34.835079 kubelet[1930]: E1213 02:04:34.834815 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:04:34.835496 env[1201]: time="2024-12-13T02:04:34.835473378Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-9zn6q,Uid:0d1882a6-9d8f-43ef-958e-b21696c8b1a8,Namespace:kube-system,Attempt:1,}" Dec 13 02:04:34.840182 env[1201]: 2024-12-13 02:04:34.753 [INFO][3270] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76" Dec 13 02:04:34.840182 env[1201]: 2024-12-13 02:04:34.753 [INFO][3270] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76" iface="eth0" netns="/var/run/netns/cni-22091a76-aeb4-b379-4da2-233f02028752" Dec 13 02:04:34.840182 env[1201]: 2024-12-13 02:04:34.754 [INFO][3270] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76" iface="eth0" netns="/var/run/netns/cni-22091a76-aeb4-b379-4da2-233f02028752" Dec 13 02:04:34.840182 env[1201]: 2024-12-13 02:04:34.754 [INFO][3270] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76" iface="eth0" netns="/var/run/netns/cni-22091a76-aeb4-b379-4da2-233f02028752" Dec 13 02:04:34.840182 env[1201]: 2024-12-13 02:04:34.754 [INFO][3270] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76" Dec 13 02:04:34.840182 env[1201]: 2024-12-13 02:04:34.754 [INFO][3270] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76" Dec 13 02:04:34.840182 env[1201]: 2024-12-13 02:04:34.814 [INFO][3301] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76" HandleID="k8s-pod-network.6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76" Workload="localhost-k8s-calico--kube--controllers--6f7685584c--tn7w2-eth0" Dec 13 02:04:34.840182 env[1201]: 2024-12-13 02:04:34.815 [INFO][3301] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:04:34.840182 env[1201]: 2024-12-13 02:04:34.826 [INFO][3301] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:04:34.840182 env[1201]: 2024-12-13 02:04:34.832 [WARNING][3301] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76" HandleID="k8s-pod-network.6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76" Workload="localhost-k8s-calico--kube--controllers--6f7685584c--tn7w2-eth0" Dec 13 02:04:34.840182 env[1201]: 2024-12-13 02:04:34.832 [INFO][3301] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76" HandleID="k8s-pod-network.6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76" Workload="localhost-k8s-calico--kube--controllers--6f7685584c--tn7w2-eth0" Dec 13 02:04:34.840182 env[1201]: 2024-12-13 02:04:34.835 [INFO][3301] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:04:34.840182 env[1201]: 2024-12-13 02:04:34.837 [INFO][3270] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76" Dec 13 02:04:34.841537 env[1201]: time="2024-12-13T02:04:34.841480642Z" level=info msg="TearDown network for sandbox \"6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76\" successfully" Dec 13 02:04:34.841594 env[1201]: time="2024-12-13T02:04:34.841538447Z" level=info msg="StopPodSandbox for \"6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76\" returns successfully" Dec 13 02:04:34.842149 env[1201]: time="2024-12-13T02:04:34.842114838Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6f7685584c-tn7w2,Uid:da007ed8-1e90-41d5-a725-d1c3c3736c1f,Namespace:calico-system,Attempt:1,}" Dec 13 02:04:34.842176 systemd[1]: run-netns-cni\x2d22091a76\x2daeb4\x2db379\x2d4da2\x2d233f02028752.mount: Deactivated successfully. Dec 13 02:04:34.847557 env[1201]: 2024-12-13 02:04:34.775 [INFO][3291] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47" Dec 13 02:04:34.847557 env[1201]: 2024-12-13 02:04:34.775 [INFO][3291] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47" iface="eth0" netns="/var/run/netns/cni-5325e129-0e60-2971-e050-6b20ab1e3950" Dec 13 02:04:34.847557 env[1201]: 2024-12-13 02:04:34.776 [INFO][3291] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47" iface="eth0" netns="/var/run/netns/cni-5325e129-0e60-2971-e050-6b20ab1e3950" Dec 13 02:04:34.847557 env[1201]: 2024-12-13 02:04:34.776 [INFO][3291] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47" iface="eth0" netns="/var/run/netns/cni-5325e129-0e60-2971-e050-6b20ab1e3950" Dec 13 02:04:34.847557 env[1201]: 2024-12-13 02:04:34.776 [INFO][3291] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47" Dec 13 02:04:34.847557 env[1201]: 2024-12-13 02:04:34.776 [INFO][3291] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47" Dec 13 02:04:34.847557 env[1201]: 2024-12-13 02:04:34.829 [INFO][3312] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47" HandleID="k8s-pod-network.0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47" Workload="localhost-k8s-calico--apiserver--844858f88f--dcngr-eth0" Dec 13 02:04:34.847557 env[1201]: 2024-12-13 02:04:34.829 [INFO][3312] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:04:34.847557 env[1201]: 2024-12-13 02:04:34.835 [INFO][3312] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:04:34.847557 env[1201]: 2024-12-13 02:04:34.842 [WARNING][3312] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47" HandleID="k8s-pod-network.0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47" Workload="localhost-k8s-calico--apiserver--844858f88f--dcngr-eth0" Dec 13 02:04:34.847557 env[1201]: 2024-12-13 02:04:34.842 [INFO][3312] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47" HandleID="k8s-pod-network.0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47" Workload="localhost-k8s-calico--apiserver--844858f88f--dcngr-eth0" Dec 13 02:04:34.847557 env[1201]: 2024-12-13 02:04:34.844 [INFO][3312] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:04:34.847557 env[1201]: 2024-12-13 02:04:34.846 [INFO][3291] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47" Dec 13 02:04:34.848151 env[1201]: time="2024-12-13T02:04:34.847705707Z" level=info msg="TearDown network for sandbox \"0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47\" successfully" Dec 13 02:04:34.848151 env[1201]: time="2024-12-13T02:04:34.847738873Z" level=info msg="StopPodSandbox for \"0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47\" returns successfully" Dec 13 02:04:34.849550 systemd[1]: run-netns-cni\x2d5325e129\x2d0e60\x2d2971\x2de050\x2d6b20ab1e3950.mount: Deactivated successfully. Dec 13 02:04:34.850286 env[1201]: time="2024-12-13T02:04:34.850254243Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-844858f88f-dcngr,Uid:e2aa5408-7118-4e83-b2a0-4139d9b8393c,Namespace:calico-apiserver,Attempt:1,}" Dec 13 02:04:34.865093 kubelet[1930]: E1213 02:04:34.865048 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:04:34.994579 systemd-networkd[1025]: cali7759d33f942: Link UP Dec 13 02:04:34.997035 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:04:34.997153 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7759d33f942: link becomes ready Dec 13 02:04:34.998018 systemd-networkd[1025]: cali7759d33f942: Gained carrier Dec 13 02:04:35.011846 env[1201]: 2024-12-13 02:04:34.901 [INFO][3329] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Dec 13 02:04:35.011846 env[1201]: 2024-12-13 02:04:34.913 [INFO][3329] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--6f6b679f8f--9zn6q-eth0 coredns-6f6b679f8f- kube-system 0d1882a6-9d8f-43ef-958e-b21696c8b1a8 891 0 2024-12-13 02:03:55 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-6f6b679f8f-9zn6q eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali7759d33f942 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="4a2a12824229d0c79556b9d27c949792ecaee049ee82dd27ca324c7be68f1a4e" Namespace="kube-system" Pod="coredns-6f6b679f8f-9zn6q" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--9zn6q-" Dec 13 02:04:35.011846 env[1201]: 2024-12-13 02:04:34.913 [INFO][3329] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="4a2a12824229d0c79556b9d27c949792ecaee049ee82dd27ca324c7be68f1a4e" Namespace="kube-system" Pod="coredns-6f6b679f8f-9zn6q" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--9zn6q-eth0" Dec 13 02:04:35.011846 env[1201]: 2024-12-13 02:04:34.951 [INFO][3389] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4a2a12824229d0c79556b9d27c949792ecaee049ee82dd27ca324c7be68f1a4e" HandleID="k8s-pod-network.4a2a12824229d0c79556b9d27c949792ecaee049ee82dd27ca324c7be68f1a4e" Workload="localhost-k8s-coredns--6f6b679f8f--9zn6q-eth0" Dec 13 02:04:35.011846 env[1201]: 2024-12-13 02:04:34.959 [INFO][3389] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="4a2a12824229d0c79556b9d27c949792ecaee049ee82dd27ca324c7be68f1a4e" HandleID="k8s-pod-network.4a2a12824229d0c79556b9d27c949792ecaee049ee82dd27ca324c7be68f1a4e" Workload="localhost-k8s-coredns--6f6b679f8f--9zn6q-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000375610), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-6f6b679f8f-9zn6q", "timestamp":"2024-12-13 02:04:34.951827365 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:04:35.011846 env[1201]: 2024-12-13 02:04:34.959 [INFO][3389] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:04:35.011846 env[1201]: 2024-12-13 02:04:34.959 [INFO][3389] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:04:35.011846 env[1201]: 2024-12-13 02:04:34.959 [INFO][3389] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 02:04:35.011846 env[1201]: 2024-12-13 02:04:34.961 [INFO][3389] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4a2a12824229d0c79556b9d27c949792ecaee049ee82dd27ca324c7be68f1a4e" host="localhost" Dec 13 02:04:35.011846 env[1201]: 2024-12-13 02:04:34.964 [INFO][3389] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 02:04:35.011846 env[1201]: 2024-12-13 02:04:34.967 [INFO][3389] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 02:04:35.011846 env[1201]: 2024-12-13 02:04:34.969 [INFO][3389] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 02:04:35.011846 env[1201]: 2024-12-13 02:04:34.970 [INFO][3389] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 02:04:35.011846 env[1201]: 2024-12-13 02:04:34.970 [INFO][3389] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.4a2a12824229d0c79556b9d27c949792ecaee049ee82dd27ca324c7be68f1a4e" host="localhost" Dec 13 02:04:35.011846 env[1201]: 2024-12-13 02:04:34.971 [INFO][3389] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.4a2a12824229d0c79556b9d27c949792ecaee049ee82dd27ca324c7be68f1a4e Dec 13 02:04:35.011846 env[1201]: 2024-12-13 02:04:34.976 [INFO][3389] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.4a2a12824229d0c79556b9d27c949792ecaee049ee82dd27ca324c7be68f1a4e" host="localhost" Dec 13 02:04:35.011846 env[1201]: 2024-12-13 02:04:34.981 [INFO][3389] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.4a2a12824229d0c79556b9d27c949792ecaee049ee82dd27ca324c7be68f1a4e" host="localhost" Dec 13 02:04:35.011846 env[1201]: 2024-12-13 02:04:34.982 [INFO][3389] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.4a2a12824229d0c79556b9d27c949792ecaee049ee82dd27ca324c7be68f1a4e" host="localhost" Dec 13 02:04:35.011846 env[1201]: 2024-12-13 02:04:34.982 [INFO][3389] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:04:35.011846 env[1201]: 2024-12-13 02:04:34.982 [INFO][3389] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="4a2a12824229d0c79556b9d27c949792ecaee049ee82dd27ca324c7be68f1a4e" HandleID="k8s-pod-network.4a2a12824229d0c79556b9d27c949792ecaee049ee82dd27ca324c7be68f1a4e" Workload="localhost-k8s-coredns--6f6b679f8f--9zn6q-eth0" Dec 13 02:04:35.012670 env[1201]: 2024-12-13 02:04:34.984 [INFO][3329] cni-plugin/k8s.go 386: Populated endpoint ContainerID="4a2a12824229d0c79556b9d27c949792ecaee049ee82dd27ca324c7be68f1a4e" Namespace="kube-system" Pod="coredns-6f6b679f8f-9zn6q" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--9zn6q-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--9zn6q-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"0d1882a6-9d8f-43ef-958e-b21696c8b1a8", ResourceVersion:"891", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 3, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-6f6b679f8f-9zn6q", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7759d33f942", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:04:35.012670 env[1201]: 2024-12-13 02:04:34.984 [INFO][3329] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="4a2a12824229d0c79556b9d27c949792ecaee049ee82dd27ca324c7be68f1a4e" Namespace="kube-system" Pod="coredns-6f6b679f8f-9zn6q" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--9zn6q-eth0" Dec 13 02:04:35.012670 env[1201]: 2024-12-13 02:04:34.984 [INFO][3329] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali7759d33f942 ContainerID="4a2a12824229d0c79556b9d27c949792ecaee049ee82dd27ca324c7be68f1a4e" Namespace="kube-system" Pod="coredns-6f6b679f8f-9zn6q" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--9zn6q-eth0" Dec 13 02:04:35.012670 env[1201]: 2024-12-13 02:04:34.998 [INFO][3329] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="4a2a12824229d0c79556b9d27c949792ecaee049ee82dd27ca324c7be68f1a4e" Namespace="kube-system" Pod="coredns-6f6b679f8f-9zn6q" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--9zn6q-eth0" Dec 13 02:04:35.012670 env[1201]: 2024-12-13 02:04:34.999 [INFO][3329] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="4a2a12824229d0c79556b9d27c949792ecaee049ee82dd27ca324c7be68f1a4e" Namespace="kube-system" Pod="coredns-6f6b679f8f-9zn6q" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--9zn6q-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--9zn6q-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"0d1882a6-9d8f-43ef-958e-b21696c8b1a8", ResourceVersion:"891", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 3, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4a2a12824229d0c79556b9d27c949792ecaee049ee82dd27ca324c7be68f1a4e", Pod:"coredns-6f6b679f8f-9zn6q", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7759d33f942", MAC:"2e:42:07:8f:c7:69", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:04:35.012670 env[1201]: 2024-12-13 02:04:35.009 [INFO][3329] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="4a2a12824229d0c79556b9d27c949792ecaee049ee82dd27ca324c7be68f1a4e" Namespace="kube-system" Pod="coredns-6f6b679f8f-9zn6q" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--9zn6q-eth0" Dec 13 02:04:35.025034 env[1201]: time="2024-12-13T02:04:35.024948725Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:04:35.025034 env[1201]: time="2024-12-13T02:04:35.024999876Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:04:35.025034 env[1201]: time="2024-12-13T02:04:35.025010929Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:04:35.025267 env[1201]: time="2024-12-13T02:04:35.025231224Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4a2a12824229d0c79556b9d27c949792ecaee049ee82dd27ca324c7be68f1a4e pid=3438 runtime=io.containerd.runc.v2 Dec 13 02:04:35.035879 systemd[1]: Started cri-containerd-4a2a12824229d0c79556b9d27c949792ecaee049ee82dd27ca324c7be68f1a4e.scope. Dec 13 02:04:35.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.047000 audit: BPF prog-id=142 op=LOAD Dec 13 02:04:35.048000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.048000 audit[3447]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3438 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.048000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461326131323832343232396430633739353536623964323763393439 Dec 13 02:04:35.048000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.048000 audit[3447]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3438 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.048000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461326131323832343232396430633739353536623964323763393439 Dec 13 02:04:35.048000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.048000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.048000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.048000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.048000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.048000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.048000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.048000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.048000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.048000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.048000 audit: BPF prog-id=143 op=LOAD Dec 13 02:04:35.048000 audit[3447]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000350470 items=0 ppid=3438 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.048000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461326131323832343232396430633739353536623964323763393439 Dec 13 02:04:35.048000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.048000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.048000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.048000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.048000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.048000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.048000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.048000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.048000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.048000 audit: BPF prog-id=144 op=LOAD Dec 13 02:04:35.048000 audit[3447]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003504b8 items=0 ppid=3438 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.048000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461326131323832343232396430633739353536623964323763393439 Dec 13 02:04:35.048000 audit: BPF prog-id=144 op=UNLOAD Dec 13 02:04:35.048000 audit: BPF prog-id=143 op=UNLOAD Dec 13 02:04:35.048000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.048000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.048000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.048000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.048000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.048000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.048000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.048000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.048000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.048000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.048000 audit: BPF prog-id=145 op=LOAD Dec 13 02:04:35.048000 audit[3447]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003508c8 items=0 ppid=3438 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.048000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461326131323832343232396430633739353536623964323763393439 Dec 13 02:04:35.049404 systemd-resolved[1139]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 02:04:35.077029 env[1201]: time="2024-12-13T02:04:35.076980917Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-9zn6q,Uid:0d1882a6-9d8f-43ef-958e-b21696c8b1a8,Namespace:kube-system,Attempt:1,} returns sandbox id \"4a2a12824229d0c79556b9d27c949792ecaee049ee82dd27ca324c7be68f1a4e\"" Dec 13 02:04:35.077666 kubelet[1930]: E1213 02:04:35.077634 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:04:35.079893 env[1201]: time="2024-12-13T02:04:35.079859311Z" level=info msg="CreateContainer within sandbox \"4a2a12824229d0c79556b9d27c949792ecaee049ee82dd27ca324c7be68f1a4e\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 02:04:35.094069 systemd-networkd[1025]: cali32538723edb: Link UP Dec 13 02:04:35.095696 systemd-networkd[1025]: cali32538723edb: Gained carrier Dec 13 02:04:35.096230 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali32538723edb: link becomes ready Dec 13 02:04:35.103265 env[1201]: time="2024-12-13T02:04:35.103209633Z" level=info msg="CreateContainer within sandbox \"4a2a12824229d0c79556b9d27c949792ecaee049ee82dd27ca324c7be68f1a4e\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"dc19ae4039b95d2755483fec5453baac4d038ed421efc2901048c3676ca0a116\"" Dec 13 02:04:35.105877 env[1201]: time="2024-12-13T02:04:35.105440617Z" level=info msg="StartContainer for \"dc19ae4039b95d2755483fec5453baac4d038ed421efc2901048c3676ca0a116\"" Dec 13 02:04:35.107006 env[1201]: 2024-12-13 02:04:34.936 [INFO][3351] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Dec 13 02:04:35.107006 env[1201]: 2024-12-13 02:04:34.944 [INFO][3351] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--6f7685584c--tn7w2-eth0 calico-kube-controllers-6f7685584c- calico-system da007ed8-1e90-41d5-a725-d1c3c3736c1f 890 0 2024-12-13 02:04:04 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:6f7685584c projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-6f7685584c-tn7w2 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali32538723edb [] []}} ContainerID="61fc3a651d5175a79ac855d09cd95783ef94a6f5768ca9577d790f6f63b62bf3" Namespace="calico-system" Pod="calico-kube-controllers-6f7685584c-tn7w2" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6f7685584c--tn7w2-" Dec 13 02:04:35.107006 env[1201]: 2024-12-13 02:04:34.944 [INFO][3351] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="61fc3a651d5175a79ac855d09cd95783ef94a6f5768ca9577d790f6f63b62bf3" Namespace="calico-system" Pod="calico-kube-controllers-6f7685584c-tn7w2" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6f7685584c--tn7w2-eth0" Dec 13 02:04:35.107006 env[1201]: 2024-12-13 02:04:35.003 [INFO][3410] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="61fc3a651d5175a79ac855d09cd95783ef94a6f5768ca9577d790f6f63b62bf3" HandleID="k8s-pod-network.61fc3a651d5175a79ac855d09cd95783ef94a6f5768ca9577d790f6f63b62bf3" Workload="localhost-k8s-calico--kube--controllers--6f7685584c--tn7w2-eth0" Dec 13 02:04:35.107006 env[1201]: 2024-12-13 02:04:35.061 [INFO][3410] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="61fc3a651d5175a79ac855d09cd95783ef94a6f5768ca9577d790f6f63b62bf3" HandleID="k8s-pod-network.61fc3a651d5175a79ac855d09cd95783ef94a6f5768ca9577d790f6f63b62bf3" Workload="localhost-k8s-calico--kube--controllers--6f7685584c--tn7w2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002f5170), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-6f7685584c-tn7w2", "timestamp":"2024-12-13 02:04:35.003473463 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:04:35.107006 env[1201]: 2024-12-13 02:04:35.061 [INFO][3410] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:04:35.107006 env[1201]: 2024-12-13 02:04:35.061 [INFO][3410] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:04:35.107006 env[1201]: 2024-12-13 02:04:35.061 [INFO][3410] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 02:04:35.107006 env[1201]: 2024-12-13 02:04:35.063 [INFO][3410] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.61fc3a651d5175a79ac855d09cd95783ef94a6f5768ca9577d790f6f63b62bf3" host="localhost" Dec 13 02:04:35.107006 env[1201]: 2024-12-13 02:04:35.066 [INFO][3410] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 02:04:35.107006 env[1201]: 2024-12-13 02:04:35.070 [INFO][3410] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 02:04:35.107006 env[1201]: 2024-12-13 02:04:35.072 [INFO][3410] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 02:04:35.107006 env[1201]: 2024-12-13 02:04:35.074 [INFO][3410] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 02:04:35.107006 env[1201]: 2024-12-13 02:04:35.074 [INFO][3410] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.61fc3a651d5175a79ac855d09cd95783ef94a6f5768ca9577d790f6f63b62bf3" host="localhost" Dec 13 02:04:35.107006 env[1201]: 2024-12-13 02:04:35.075 [INFO][3410] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.61fc3a651d5175a79ac855d09cd95783ef94a6f5768ca9577d790f6f63b62bf3 Dec 13 02:04:35.107006 env[1201]: 2024-12-13 02:04:35.082 [INFO][3410] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.61fc3a651d5175a79ac855d09cd95783ef94a6f5768ca9577d790f6f63b62bf3" host="localhost" Dec 13 02:04:35.107006 env[1201]: 2024-12-13 02:04:35.088 [INFO][3410] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.61fc3a651d5175a79ac855d09cd95783ef94a6f5768ca9577d790f6f63b62bf3" host="localhost" Dec 13 02:04:35.107006 env[1201]: 2024-12-13 02:04:35.088 [INFO][3410] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.61fc3a651d5175a79ac855d09cd95783ef94a6f5768ca9577d790f6f63b62bf3" host="localhost" Dec 13 02:04:35.107006 env[1201]: 2024-12-13 02:04:35.089 [INFO][3410] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:04:35.107006 env[1201]: 2024-12-13 02:04:35.089 [INFO][3410] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="61fc3a651d5175a79ac855d09cd95783ef94a6f5768ca9577d790f6f63b62bf3" HandleID="k8s-pod-network.61fc3a651d5175a79ac855d09cd95783ef94a6f5768ca9577d790f6f63b62bf3" Workload="localhost-k8s-calico--kube--controllers--6f7685584c--tn7w2-eth0" Dec 13 02:04:35.107588 env[1201]: 2024-12-13 02:04:35.092 [INFO][3351] cni-plugin/k8s.go 386: Populated endpoint ContainerID="61fc3a651d5175a79ac855d09cd95783ef94a6f5768ca9577d790f6f63b62bf3" Namespace="calico-system" Pod="calico-kube-controllers-6f7685584c-tn7w2" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6f7685584c--tn7w2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--6f7685584c--tn7w2-eth0", GenerateName:"calico-kube-controllers-6f7685584c-", Namespace:"calico-system", SelfLink:"", UID:"da007ed8-1e90-41d5-a725-d1c3c3736c1f", ResourceVersion:"890", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 4, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6f7685584c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-6f7685584c-tn7w2", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali32538723edb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:04:35.107588 env[1201]: 2024-12-13 02:04:35.092 [INFO][3351] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="61fc3a651d5175a79ac855d09cd95783ef94a6f5768ca9577d790f6f63b62bf3" Namespace="calico-system" Pod="calico-kube-controllers-6f7685584c-tn7w2" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6f7685584c--tn7w2-eth0" Dec 13 02:04:35.107588 env[1201]: 2024-12-13 02:04:35.092 [INFO][3351] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali32538723edb ContainerID="61fc3a651d5175a79ac855d09cd95783ef94a6f5768ca9577d790f6f63b62bf3" Namespace="calico-system" Pod="calico-kube-controllers-6f7685584c-tn7w2" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6f7685584c--tn7w2-eth0" Dec 13 02:04:35.107588 env[1201]: 2024-12-13 02:04:35.095 [INFO][3351] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="61fc3a651d5175a79ac855d09cd95783ef94a6f5768ca9577d790f6f63b62bf3" Namespace="calico-system" Pod="calico-kube-controllers-6f7685584c-tn7w2" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6f7685584c--tn7w2-eth0" Dec 13 02:04:35.107588 env[1201]: 2024-12-13 02:04:35.096 [INFO][3351] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="61fc3a651d5175a79ac855d09cd95783ef94a6f5768ca9577d790f6f63b62bf3" Namespace="calico-system" Pod="calico-kube-controllers-6f7685584c-tn7w2" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6f7685584c--tn7w2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--6f7685584c--tn7w2-eth0", GenerateName:"calico-kube-controllers-6f7685584c-", Namespace:"calico-system", SelfLink:"", UID:"da007ed8-1e90-41d5-a725-d1c3c3736c1f", ResourceVersion:"890", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 4, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6f7685584c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"61fc3a651d5175a79ac855d09cd95783ef94a6f5768ca9577d790f6f63b62bf3", Pod:"calico-kube-controllers-6f7685584c-tn7w2", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali32538723edb", MAC:"0a:a4:f7:94:1f:e1", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:04:35.107588 env[1201]: 2024-12-13 02:04:35.104 [INFO][3351] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="61fc3a651d5175a79ac855d09cd95783ef94a6f5768ca9577d790f6f63b62bf3" Namespace="calico-system" Pod="calico-kube-controllers-6f7685584c-tn7w2" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6f7685584c--tn7w2-eth0" Dec 13 02:04:35.122386 systemd[1]: Started cri-containerd-dc19ae4039b95d2755483fec5453baac4d038ed421efc2901048c3676ca0a116.scope. Dec 13 02:04:35.126987 env[1201]: time="2024-12-13T02:04:35.125851453Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:04:35.126987 env[1201]: time="2024-12-13T02:04:35.125889228Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:04:35.126987 env[1201]: time="2024-12-13T02:04:35.125899538Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:04:35.126987 env[1201]: time="2024-12-13T02:04:35.125998023Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/61fc3a651d5175a79ac855d09cd95783ef94a6f5768ca9577d790f6f63b62bf3 pid=3510 runtime=io.containerd.runc.v2 Dec 13 02:04:35.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.134000 audit: BPF prog-id=146 op=LOAD Dec 13 02:04:35.134000 audit[3488]: AVC avc: denied { bpf } for pid=3488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.134000 audit[3488]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3438 pid=3488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463313961653430333962393564323735353438336665633534353362 Dec 13 02:04:35.134000 audit[3488]: AVC avc: denied { perfmon } for pid=3488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.134000 audit[3488]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3438 pid=3488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463313961653430333962393564323735353438336665633534353362 Dec 13 02:04:35.134000 audit[3488]: AVC avc: denied { bpf } for pid=3488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.134000 audit[3488]: AVC avc: denied { bpf } for pid=3488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.134000 audit[3488]: AVC avc: denied { bpf } for pid=3488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.134000 audit[3488]: AVC avc: denied { perfmon } for pid=3488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.134000 audit[3488]: AVC avc: denied { perfmon } for pid=3488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.134000 audit[3488]: AVC avc: denied { perfmon } for pid=3488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.134000 audit[3488]: AVC avc: denied { perfmon } for pid=3488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.134000 audit[3488]: AVC avc: denied { perfmon } for pid=3488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.134000 audit[3488]: AVC avc: denied { bpf } for pid=3488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.134000 audit[3488]: AVC avc: denied { bpf } for pid=3488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.134000 audit: BPF prog-id=147 op=LOAD Dec 13 02:04:35.134000 audit[3488]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000286dd0 items=0 ppid=3438 pid=3488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463313961653430333962393564323735353438336665633534353362 Dec 13 02:04:35.134000 audit[3488]: AVC avc: denied { bpf } for pid=3488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.134000 audit[3488]: AVC avc: denied { bpf } for pid=3488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.134000 audit[3488]: AVC avc: denied { perfmon } for pid=3488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.134000 audit[3488]: AVC avc: denied { perfmon } for pid=3488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.134000 audit[3488]: AVC avc: denied { perfmon } for pid=3488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.134000 audit[3488]: AVC avc: denied { perfmon } for pid=3488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.134000 audit[3488]: AVC avc: denied { perfmon } for pid=3488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.134000 audit[3488]: AVC avc: denied { bpf } for pid=3488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.134000 audit[3488]: AVC avc: denied { bpf } for pid=3488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.134000 audit: BPF prog-id=148 op=LOAD Dec 13 02:04:35.134000 audit[3488]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000286e18 items=0 ppid=3438 pid=3488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463313961653430333962393564323735353438336665633534353362 Dec 13 02:04:35.134000 audit: BPF prog-id=148 op=UNLOAD Dec 13 02:04:35.134000 audit: BPF prog-id=147 op=UNLOAD Dec 13 02:04:35.134000 audit[3488]: AVC avc: denied { bpf } for pid=3488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.134000 audit[3488]: AVC avc: denied { bpf } for pid=3488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.134000 audit[3488]: AVC avc: denied { bpf } for pid=3488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.134000 audit[3488]: AVC avc: denied { perfmon } for pid=3488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.134000 audit[3488]: AVC avc: denied { perfmon } for pid=3488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.134000 audit[3488]: AVC avc: denied { perfmon } for pid=3488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.134000 audit[3488]: AVC avc: denied { perfmon } for pid=3488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.134000 audit[3488]: AVC avc: denied { perfmon } for pid=3488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.134000 audit[3488]: AVC avc: denied { bpf } for pid=3488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.134000 audit[3488]: AVC avc: denied { bpf } for pid=3488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.134000 audit: BPF prog-id=149 op=LOAD Dec 13 02:04:35.134000 audit[3488]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000287228 items=0 ppid=3438 pid=3488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463313961653430333962393564323735353438336665633534353362 Dec 13 02:04:35.138947 systemd[1]: Started cri-containerd-61fc3a651d5175a79ac855d09cd95783ef94a6f5768ca9577d790f6f63b62bf3.scope. Dec 13 02:04:35.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.151000 audit: BPF prog-id=150 op=LOAD Dec 13 02:04:35.151000 audit[3521]: AVC avc: denied { bpf } for pid=3521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.151000 audit[3521]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3510 pid=3521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.151000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631666333613635316435313735613739616338353564303963643935 Dec 13 02:04:35.151000 audit[3521]: AVC avc: denied { perfmon } for pid=3521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.151000 audit[3521]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3510 pid=3521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.151000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631666333613635316435313735613739616338353564303963643935 Dec 13 02:04:35.151000 audit[3521]: AVC avc: denied { bpf } for pid=3521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.151000 audit[3521]: AVC avc: denied { bpf } for pid=3521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.151000 audit[3521]: AVC avc: denied { bpf } for pid=3521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.151000 audit[3521]: AVC avc: denied { perfmon } for pid=3521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.151000 audit[3521]: AVC avc: denied { perfmon } for pid=3521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.151000 audit[3521]: AVC avc: denied { perfmon } for pid=3521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.151000 audit[3521]: AVC avc: denied { perfmon } for pid=3521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.151000 audit[3521]: AVC avc: denied { perfmon } for pid=3521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.151000 audit[3521]: AVC avc: denied { bpf } for pid=3521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.151000 audit[3521]: AVC avc: denied { bpf } for pid=3521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.151000 audit: BPF prog-id=151 op=LOAD Dec 13 02:04:35.151000 audit[3521]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003512f0 items=0 ppid=3510 pid=3521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.151000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631666333613635316435313735613739616338353564303963643935 Dec 13 02:04:35.151000 audit[3521]: AVC avc: denied { bpf } for pid=3521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.151000 audit[3521]: AVC avc: denied { bpf } for pid=3521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.151000 audit[3521]: AVC avc: denied { perfmon } for pid=3521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.151000 audit[3521]: AVC avc: denied { perfmon } for pid=3521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.151000 audit[3521]: AVC avc: denied { perfmon } for pid=3521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.151000 audit[3521]: AVC avc: denied { perfmon } for pid=3521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.151000 audit[3521]: AVC avc: denied { perfmon } for pid=3521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.151000 audit[3521]: AVC avc: denied { bpf } for pid=3521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.151000 audit[3521]: AVC avc: denied { bpf } for pid=3521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.151000 audit: BPF prog-id=152 op=LOAD Dec 13 02:04:35.151000 audit[3521]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000351338 items=0 ppid=3510 pid=3521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.151000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631666333613635316435313735613739616338353564303963643935 Dec 13 02:04:35.151000 audit: BPF prog-id=152 op=UNLOAD Dec 13 02:04:35.151000 audit: BPF prog-id=151 op=UNLOAD Dec 13 02:04:35.151000 audit[3521]: AVC avc: denied { bpf } for pid=3521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.151000 audit[3521]: AVC avc: denied { bpf } for pid=3521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.151000 audit[3521]: AVC avc: denied { bpf } for pid=3521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.151000 audit[3521]: AVC avc: denied { perfmon } for pid=3521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.151000 audit[3521]: AVC avc: denied { perfmon } for pid=3521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.151000 audit[3521]: AVC avc: denied { perfmon } for pid=3521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.151000 audit[3521]: AVC avc: denied { perfmon } for pid=3521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.151000 audit[3521]: AVC avc: denied { perfmon } for pid=3521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.151000 audit[3521]: AVC avc: denied { bpf } for pid=3521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.151000 audit[3521]: AVC avc: denied { bpf } for pid=3521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.151000 audit: BPF prog-id=153 op=LOAD Dec 13 02:04:35.151000 audit[3521]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000351748 items=0 ppid=3510 pid=3521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.151000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631666333613635316435313735613739616338353564303963643935 Dec 13 02:04:35.155900 env[1201]: time="2024-12-13T02:04:35.153159495Z" level=info msg="StartContainer for \"dc19ae4039b95d2755483fec5453baac4d038ed421efc2901048c3676ca0a116\" returns successfully" Dec 13 02:04:35.153416 systemd-resolved[1139]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 02:04:35.188802 env[1201]: time="2024-12-13T02:04:35.188755161Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6f7685584c-tn7w2,Uid:da007ed8-1e90-41d5-a725-d1c3c3736c1f,Namespace:calico-system,Attempt:1,} returns sandbox id \"61fc3a651d5175a79ac855d09cd95783ef94a6f5768ca9577d790f6f63b62bf3\"" Dec 13 02:04:35.190171 env[1201]: time="2024-12-13T02:04:35.190147686Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 13 02:04:35.195390 systemd-networkd[1025]: cali0bc93bb69ef: Link UP Dec 13 02:04:35.196471 systemd-networkd[1025]: cali0bc93bb69ef: Gained carrier Dec 13 02:04:35.197211 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0bc93bb69ef: link becomes ready Dec 13 02:04:35.207888 env[1201]: 2024-12-13 02:04:34.921 [INFO][3361] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Dec 13 02:04:35.207888 env[1201]: 2024-12-13 02:04:34.934 [INFO][3361] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--844858f88f--dcngr-eth0 calico-apiserver-844858f88f- calico-apiserver e2aa5408-7118-4e83-b2a0-4139d9b8393c 892 0 2024-12-13 02:04:04 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:844858f88f projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-844858f88f-dcngr eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali0bc93bb69ef [] []}} ContainerID="6d11c7f94fff1f9af410bd51e47b60361194998dda5fcd0346c76b30094c30af" Namespace="calico-apiserver" Pod="calico-apiserver-844858f88f-dcngr" WorkloadEndpoint="localhost-k8s-calico--apiserver--844858f88f--dcngr-" Dec 13 02:04:35.207888 env[1201]: 2024-12-13 02:04:34.934 [INFO][3361] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="6d11c7f94fff1f9af410bd51e47b60361194998dda5fcd0346c76b30094c30af" Namespace="calico-apiserver" Pod="calico-apiserver-844858f88f-dcngr" WorkloadEndpoint="localhost-k8s-calico--apiserver--844858f88f--dcngr-eth0" Dec 13 02:04:35.207888 env[1201]: 2024-12-13 02:04:34.971 [INFO][3401] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6d11c7f94fff1f9af410bd51e47b60361194998dda5fcd0346c76b30094c30af" HandleID="k8s-pod-network.6d11c7f94fff1f9af410bd51e47b60361194998dda5fcd0346c76b30094c30af" Workload="localhost-k8s-calico--apiserver--844858f88f--dcngr-eth0" Dec 13 02:04:35.207888 env[1201]: 2024-12-13 02:04:35.061 [INFO][3401] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="6d11c7f94fff1f9af410bd51e47b60361194998dda5fcd0346c76b30094c30af" HandleID="k8s-pod-network.6d11c7f94fff1f9af410bd51e47b60361194998dda5fcd0346c76b30094c30af" Workload="localhost-k8s-calico--apiserver--844858f88f--dcngr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002fdb10), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-844858f88f-dcngr", "timestamp":"2024-12-13 02:04:34.971424384 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:04:35.207888 env[1201]: 2024-12-13 02:04:35.061 [INFO][3401] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:04:35.207888 env[1201]: 2024-12-13 02:04:35.089 [INFO][3401] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:04:35.207888 env[1201]: 2024-12-13 02:04:35.089 [INFO][3401] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 02:04:35.207888 env[1201]: 2024-12-13 02:04:35.164 [INFO][3401] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6d11c7f94fff1f9af410bd51e47b60361194998dda5fcd0346c76b30094c30af" host="localhost" Dec 13 02:04:35.207888 env[1201]: 2024-12-13 02:04:35.167 [INFO][3401] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 02:04:35.207888 env[1201]: 2024-12-13 02:04:35.171 [INFO][3401] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 02:04:35.207888 env[1201]: 2024-12-13 02:04:35.173 [INFO][3401] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 02:04:35.207888 env[1201]: 2024-12-13 02:04:35.174 [INFO][3401] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 02:04:35.207888 env[1201]: 2024-12-13 02:04:35.174 [INFO][3401] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.6d11c7f94fff1f9af410bd51e47b60361194998dda5fcd0346c76b30094c30af" host="localhost" Dec 13 02:04:35.207888 env[1201]: 2024-12-13 02:04:35.176 [INFO][3401] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.6d11c7f94fff1f9af410bd51e47b60361194998dda5fcd0346c76b30094c30af Dec 13 02:04:35.207888 env[1201]: 2024-12-13 02:04:35.180 [INFO][3401] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.6d11c7f94fff1f9af410bd51e47b60361194998dda5fcd0346c76b30094c30af" host="localhost" Dec 13 02:04:35.207888 env[1201]: 2024-12-13 02:04:35.187 [INFO][3401] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.6d11c7f94fff1f9af410bd51e47b60361194998dda5fcd0346c76b30094c30af" host="localhost" Dec 13 02:04:35.207888 env[1201]: 2024-12-13 02:04:35.187 [INFO][3401] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.6d11c7f94fff1f9af410bd51e47b60361194998dda5fcd0346c76b30094c30af" host="localhost" Dec 13 02:04:35.207888 env[1201]: 2024-12-13 02:04:35.187 [INFO][3401] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:04:35.207888 env[1201]: 2024-12-13 02:04:35.187 [INFO][3401] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="6d11c7f94fff1f9af410bd51e47b60361194998dda5fcd0346c76b30094c30af" HandleID="k8s-pod-network.6d11c7f94fff1f9af410bd51e47b60361194998dda5fcd0346c76b30094c30af" Workload="localhost-k8s-calico--apiserver--844858f88f--dcngr-eth0" Dec 13 02:04:35.208571 env[1201]: 2024-12-13 02:04:35.191 [INFO][3361] cni-plugin/k8s.go 386: Populated endpoint ContainerID="6d11c7f94fff1f9af410bd51e47b60361194998dda5fcd0346c76b30094c30af" Namespace="calico-apiserver" Pod="calico-apiserver-844858f88f-dcngr" WorkloadEndpoint="localhost-k8s-calico--apiserver--844858f88f--dcngr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--844858f88f--dcngr-eth0", GenerateName:"calico-apiserver-844858f88f-", Namespace:"calico-apiserver", SelfLink:"", UID:"e2aa5408-7118-4e83-b2a0-4139d9b8393c", ResourceVersion:"892", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 4, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"844858f88f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-844858f88f-dcngr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0bc93bb69ef", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:04:35.208571 env[1201]: 2024-12-13 02:04:35.191 [INFO][3361] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="6d11c7f94fff1f9af410bd51e47b60361194998dda5fcd0346c76b30094c30af" Namespace="calico-apiserver" Pod="calico-apiserver-844858f88f-dcngr" WorkloadEndpoint="localhost-k8s-calico--apiserver--844858f88f--dcngr-eth0" Dec 13 02:04:35.208571 env[1201]: 2024-12-13 02:04:35.191 [INFO][3361] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali0bc93bb69ef ContainerID="6d11c7f94fff1f9af410bd51e47b60361194998dda5fcd0346c76b30094c30af" Namespace="calico-apiserver" Pod="calico-apiserver-844858f88f-dcngr" WorkloadEndpoint="localhost-k8s-calico--apiserver--844858f88f--dcngr-eth0" Dec 13 02:04:35.208571 env[1201]: 2024-12-13 02:04:35.196 [INFO][3361] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="6d11c7f94fff1f9af410bd51e47b60361194998dda5fcd0346c76b30094c30af" Namespace="calico-apiserver" Pod="calico-apiserver-844858f88f-dcngr" WorkloadEndpoint="localhost-k8s-calico--apiserver--844858f88f--dcngr-eth0" Dec 13 02:04:35.208571 env[1201]: 2024-12-13 02:04:35.197 [INFO][3361] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="6d11c7f94fff1f9af410bd51e47b60361194998dda5fcd0346c76b30094c30af" Namespace="calico-apiserver" Pod="calico-apiserver-844858f88f-dcngr" WorkloadEndpoint="localhost-k8s-calico--apiserver--844858f88f--dcngr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--844858f88f--dcngr-eth0", GenerateName:"calico-apiserver-844858f88f-", Namespace:"calico-apiserver", SelfLink:"", UID:"e2aa5408-7118-4e83-b2a0-4139d9b8393c", ResourceVersion:"892", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 4, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"844858f88f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"6d11c7f94fff1f9af410bd51e47b60361194998dda5fcd0346c76b30094c30af", Pod:"calico-apiserver-844858f88f-dcngr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0bc93bb69ef", MAC:"36:32:a1:98:cb:d3", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:04:35.208571 env[1201]: 2024-12-13 02:04:35.206 [INFO][3361] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="6d11c7f94fff1f9af410bd51e47b60361194998dda5fcd0346c76b30094c30af" Namespace="calico-apiserver" Pod="calico-apiserver-844858f88f-dcngr" WorkloadEndpoint="localhost-k8s-calico--apiserver--844858f88f--dcngr-eth0" Dec 13 02:04:35.222964 env[1201]: time="2024-12-13T02:04:35.222900719Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:04:35.222964 env[1201]: time="2024-12-13T02:04:35.222938313Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:04:35.223211 env[1201]: time="2024-12-13T02:04:35.222947371Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:04:35.223424 env[1201]: time="2024-12-13T02:04:35.223380307Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6d11c7f94fff1f9af410bd51e47b60361194998dda5fcd0346c76b30094c30af pid=3581 runtime=io.containerd.runc.v2 Dec 13 02:04:35.241475 systemd[1]: Started cri-containerd-6d11c7f94fff1f9af410bd51e47b60361194998dda5fcd0346c76b30094c30af.scope. Dec 13 02:04:35.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.256000 audit: BPF prog-id=154 op=LOAD Dec 13 02:04:35.256000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.256000 audit[3594]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3581 pid=3594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.256000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664313163376639346666663166396166343130626435316534376236 Dec 13 02:04:35.256000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.256000 audit[3594]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3581 pid=3594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.256000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664313163376639346666663166396166343130626435316534376236 Dec 13 02:04:35.256000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.256000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.256000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.256000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.256000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.256000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.256000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.256000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.256000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.256000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.256000 audit: BPF prog-id=155 op=LOAD Dec 13 02:04:35.256000 audit[3594]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003be820 items=0 ppid=3581 pid=3594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.256000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664313163376639346666663166396166343130626435316534376236 Dec 13 02:04:35.257000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.257000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.257000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.257000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.257000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.257000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.257000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.257000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.257000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.257000 audit: BPF prog-id=156 op=LOAD Dec 13 02:04:35.257000 audit[3594]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003be868 items=0 ppid=3581 pid=3594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.257000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664313163376639346666663166396166343130626435316534376236 Dec 13 02:04:35.257000 audit: BPF prog-id=156 op=UNLOAD Dec 13 02:04:35.257000 audit: BPF prog-id=155 op=UNLOAD Dec 13 02:04:35.257000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.257000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.257000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.257000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.257000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.257000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.257000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.257000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.257000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.257000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.257000 audit: BPF prog-id=157 op=LOAD Dec 13 02:04:35.257000 audit[3594]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003bec78 items=0 ppid=3581 pid=3594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.257000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664313163376639346666663166396166343130626435316534376236 Dec 13 02:04:35.259324 systemd-resolved[1139]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 02:04:35.288310 env[1201]: time="2024-12-13T02:04:35.288257840Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-844858f88f-dcngr,Uid:e2aa5408-7118-4e83-b2a0-4139d9b8393c,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"6d11c7f94fff1f9af410bd51e47b60361194998dda5fcd0346c76b30094c30af\"" Dec 13 02:04:35.503000 audit[3667]: AVC avc: denied { write } for pid=3667 comm="tee" name="fd" dev="proc" ino=25145 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:04:35.503000 audit[3667]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff08d85a34 a2=241 a3=1b6 items=1 ppid=3629 pid=3667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.503000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 02:04:35.503000 audit: PATH item=0 name="/dev/fd/63" inode=26689 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:35.503000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:04:35.512000 audit[3679]: AVC avc: denied { write } for pid=3679 comm="tee" name="fd" dev="proc" ino=25995 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:04:35.512000 audit[3679]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffff77ada32 a2=241 a3=1b6 items=1 ppid=3640 pid=3679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.512000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 02:04:35.512000 audit: PATH item=0 name="/dev/fd/63" inode=25987 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:35.512000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:04:35.516000 audit[3688]: AVC avc: denied { write } for pid=3688 comm="tee" name="fd" dev="proc" ino=25153 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:04:35.516000 audit[3688]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc16aeaa33 a2=241 a3=1b6 items=1 ppid=3632 pid=3688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.516000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 02:04:35.516000 audit: PATH item=0 name="/dev/fd/63" inode=27768 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:35.516000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:04:35.517000 audit[3693]: AVC avc: denied { write } for pid=3693 comm="tee" name="fd" dev="proc" ino=26698 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:04:35.520000 audit[3702]: AVC avc: denied { write } for pid=3702 comm="tee" name="fd" dev="proc" ino=26002 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:04:35.520000 audit[3702]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffce67b2a32 a2=241 a3=1b6 items=1 ppid=3642 pid=3702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.520000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 02:04:35.520000 audit: PATH item=0 name="/dev/fd/63" inode=25150 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:35.520000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:04:35.517000 audit[3693]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffff60b8a22 a2=241 a3=1b6 items=1 ppid=3637 pid=3693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.517000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 02:04:35.517000 audit: PATH item=0 name="/dev/fd/63" inode=26693 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:35.517000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:04:35.527000 audit[3704]: AVC avc: denied { write } for pid=3704 comm="tee" name="fd" dev="proc" ino=27774 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:04:35.527000 audit[3704]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc13f82a23 a2=241 a3=1b6 items=1 ppid=3636 pid=3704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.527000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 02:04:35.527000 audit: PATH item=0 name="/dev/fd/63" inode=27769 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:35.527000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:04:35.528000 audit[3708]: AVC avc: denied { write } for pid=3708 comm="tee" name="fd" dev="proc" ino=27778 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:04:35.528000 audit[3708]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc89485a32 a2=241 a3=1b6 items=1 ppid=3635 pid=3708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.528000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 02:04:35.528000 audit: PATH item=0 name="/dev/fd/63" inode=26004 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:35.528000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:04:35.634000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.634000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.634000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.634000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.634000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.634000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.634000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.634000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.634000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.634000 audit: BPF prog-id=158 op=LOAD Dec 13 02:04:35.634000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd8db33ee0 a2=98 a3=3 items=0 ppid=3639 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.634000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:04:35.634000 audit: BPF prog-id=158 op=UNLOAD Dec 13 02:04:35.634000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.634000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.634000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.634000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.634000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.634000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.634000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.634000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.634000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.634000 audit: BPF prog-id=159 op=LOAD Dec 13 02:04:35.634000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd8db33cc0 a2=74 a3=540051 items=0 ppid=3639 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.634000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:04:35.634000 audit: BPF prog-id=159 op=UNLOAD Dec 13 02:04:35.634000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.634000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.634000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.634000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.634000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.634000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.634000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.634000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.634000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.634000 audit: BPF prog-id=160 op=LOAD Dec 13 02:04:35.634000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd8db33cf0 a2=94 a3=2 items=0 ppid=3639 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.634000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:04:35.634000 audit: BPF prog-id=160 op=UNLOAD Dec 13 02:04:35.747000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.747000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.747000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.747000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.747000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.747000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.747000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.747000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.747000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.747000 audit: BPF prog-id=161 op=LOAD Dec 13 02:04:35.747000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd8db33bb0 a2=40 a3=1 items=0 ppid=3639 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.747000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:04:35.748000 audit: BPF prog-id=161 op=UNLOAD Dec 13 02:04:35.748000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.748000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd8db33c80 a2=50 a3=7ffd8db33d60 items=0 ppid=3639 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.748000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:04:35.755000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.755000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd8db33bc0 a2=28 a3=0 items=0 ppid=3639 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.755000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:04:35.755000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.755000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd8db33bf0 a2=28 a3=0 items=0 ppid=3639 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.755000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:04:35.755000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.755000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd8db33b00 a2=28 a3=0 items=0 ppid=3639 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.755000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:04:35.755000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.755000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd8db33c10 a2=28 a3=0 items=0 ppid=3639 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.755000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:04:35.755000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.755000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd8db33bf0 a2=28 a3=0 items=0 ppid=3639 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.755000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:04:35.755000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.755000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd8db33be0 a2=28 a3=0 items=0 ppid=3639 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.755000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:04:35.755000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.755000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd8db33c10 a2=28 a3=0 items=0 ppid=3639 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.755000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:04:35.755000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.755000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd8db33bf0 a2=28 a3=0 items=0 ppid=3639 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.755000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:04:35.755000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.755000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd8db33c10 a2=28 a3=0 items=0 ppid=3639 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.755000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:04:35.755000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.755000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd8db33be0 a2=28 a3=0 items=0 ppid=3639 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.755000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:04:35.755000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.755000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd8db33c50 a2=28 a3=0 items=0 ppid=3639 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.755000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:04:35.755000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.755000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd8db33a00 a2=50 a3=1 items=0 ppid=3639 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.755000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:04:35.755000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.755000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.755000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.755000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.755000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.755000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.755000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.755000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.755000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.755000 audit: BPF prog-id=162 op=LOAD Dec 13 02:04:35.755000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd8db33a00 a2=94 a3=5 items=0 ppid=3639 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.755000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:04:35.756000 audit: BPF prog-id=162 op=UNLOAD Dec 13 02:04:35.756000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.756000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd8db33ab0 a2=50 a3=1 items=0 ppid=3639 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.756000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:04:35.756000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.756000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd8db33bd0 a2=4 a3=38 items=0 ppid=3639 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.756000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:04:35.756000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.756000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.756000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.756000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.756000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.756000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.756000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.756000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.756000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.756000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.756000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:04:35.756000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd8db33c20 a2=94 a3=6 items=0 ppid=3639 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.756000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:04:35.756000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.756000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.756000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.756000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.756000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.756000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.756000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.756000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.756000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.756000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.756000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:04:35.756000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd8db333d0 a2=94 a3=83 items=0 ppid=3639 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.756000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:04:35.756000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.756000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.756000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.756000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.756000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.756000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.756000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.756000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.756000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.756000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.756000 audit[3749]: AVC avc: denied { confidentiality } for pid=3749 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:04:35.756000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd8db333d0 a2=94 a3=83 items=0 ppid=3639 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.756000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:04:35.763000 audit[3752]: AVC avc: denied { bpf } for pid=3752 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.763000 audit[3752]: AVC avc: denied { bpf } for pid=3752 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.763000 audit[3752]: AVC avc: denied { perfmon } for pid=3752 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.763000 audit[3752]: AVC avc: denied { perfmon } for pid=3752 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.763000 audit[3752]: AVC avc: denied { perfmon } for pid=3752 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.763000 audit[3752]: AVC avc: denied { perfmon } for pid=3752 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.763000 audit[3752]: AVC avc: denied { perfmon } for pid=3752 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.763000 audit[3752]: AVC avc: denied { bpf } for pid=3752 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.763000 audit[3752]: AVC avc: denied { bpf } for pid=3752 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.763000 audit: BPF prog-id=163 op=LOAD Dec 13 02:04:35.763000 audit[3752]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff066d4570 a2=98 a3=1999999999999999 items=0 ppid=3639 pid=3752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.763000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:04:35.763000 audit: BPF prog-id=163 op=UNLOAD Dec 13 02:04:35.763000 audit[3752]: AVC avc: denied { bpf } for pid=3752 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.763000 audit[3752]: AVC avc: denied { bpf } for pid=3752 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.763000 audit[3752]: AVC avc: denied { perfmon } for pid=3752 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.763000 audit[3752]: AVC avc: denied { perfmon } for pid=3752 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.763000 audit[3752]: AVC avc: denied { perfmon } for pid=3752 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.763000 audit[3752]: AVC avc: denied { perfmon } for pid=3752 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.763000 audit[3752]: AVC avc: denied { perfmon } for pid=3752 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.763000 audit[3752]: AVC avc: denied { bpf } for pid=3752 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.763000 audit[3752]: AVC avc: denied { bpf } for pid=3752 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.763000 audit: BPF prog-id=164 op=LOAD Dec 13 02:04:35.763000 audit[3752]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff066d4450 a2=74 a3=ffff items=0 ppid=3639 pid=3752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.763000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:04:35.763000 audit: BPF prog-id=164 op=UNLOAD Dec 13 02:04:35.763000 audit[3752]: AVC avc: denied { bpf } for pid=3752 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.763000 audit[3752]: AVC avc: denied { bpf } for pid=3752 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.763000 audit[3752]: AVC avc: denied { perfmon } for pid=3752 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.763000 audit[3752]: AVC avc: denied { perfmon } for pid=3752 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.763000 audit[3752]: AVC avc: denied { perfmon } for pid=3752 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.763000 audit[3752]: AVC avc: denied { perfmon } for pid=3752 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.763000 audit[3752]: AVC avc: denied { perfmon } for pid=3752 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.763000 audit[3752]: AVC avc: denied { bpf } for pid=3752 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.763000 audit[3752]: AVC avc: denied { bpf } for pid=3752 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.763000 audit: BPF prog-id=165 op=LOAD Dec 13 02:04:35.763000 audit[3752]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff066d4490 a2=40 a3=7fff066d4670 items=0 ppid=3639 pid=3752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.763000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:04:35.763000 audit: BPF prog-id=165 op=UNLOAD Dec 13 02:04:35.807770 systemd-networkd[1025]: vxlan.calico: Link UP Dec 13 02:04:35.807782 systemd-networkd[1025]: vxlan.calico: Gained carrier Dec 13 02:04:35.828000 audit[3779]: AVC avc: denied { bpf } for pid=3779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.831091 kernel: kauditd_printk_skb: 495 callbacks suppressed Dec 13 02:04:35.831163 kernel: audit: type=1400 audit(1734055475.828:1138): avc: denied { bpf } for pid=3779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.828000 audit[3779]: AVC avc: denied { bpf } for pid=3779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.837933 kernel: audit: type=1400 audit(1734055475.828:1138): avc: denied { bpf } for pid=3779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.838022 kernel: audit: type=1400 audit(1734055475.828:1138): avc: denied { perfmon } for pid=3779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.828000 audit[3779]: AVC avc: denied { perfmon } for pid=3779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.828000 audit[3779]: AVC avc: denied { perfmon } for pid=3779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.845215 kernel: audit: type=1400 audit(1734055475.828:1138): avc: denied { perfmon } for pid=3779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.828000 audit[3779]: AVC avc: denied { perfmon } for pid=3779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.828000 audit[3779]: AVC avc: denied { perfmon } for pid=3779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.828000 audit[3779]: AVC avc: denied { perfmon } for pid=3779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.851224 kernel: audit: type=1400 audit(1734055475.828:1138): avc: denied { perfmon } for pid=3779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.851292 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 02:04:35.851320 kernel: audit: type=1400 audit(1734055475.828:1138): avc: denied { perfmon } for pid=3779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.851346 kernel: audit: type=1400 audit(1734055475.828:1138): avc: denied { perfmon } for pid=3779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.851366 kernel: audit: audit_lost=7 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 02:04:35.851386 kernel: audit: backlog limit exceeded Dec 13 02:04:35.828000 audit[3779]: AVC avc: denied { bpf } for pid=3779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.828000 audit[3779]: AVC avc: denied { bpf } for pid=3779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.828000 audit: BPF prog-id=166 op=LOAD Dec 13 02:04:35.828000 audit[3779]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc87b7c8d0 a2=98 a3=ffffffff items=0 ppid=3639 pid=3779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.828000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:04:35.833000 audit: BPF prog-id=166 op=UNLOAD Dec 13 02:04:35.833000 audit[3779]: AVC avc: denied { bpf } for pid=3779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.833000 audit[3779]: AVC avc: denied { bpf } for pid=3779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.833000 audit[3779]: AVC avc: denied { perfmon } for pid=3779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.833000 audit[3779]: AVC avc: denied { perfmon } for pid=3779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.833000 audit[3779]: AVC avc: denied { perfmon } for pid=3779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.833000 audit[3779]: AVC avc: denied { perfmon } for pid=3779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.833000 audit[3779]: AVC avc: denied { perfmon } for pid=3779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.833000 audit[3779]: AVC avc: denied { bpf } for pid=3779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.833000 audit[3779]: AVC avc: denied { bpf } for pid=3779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.833000 audit: BPF prog-id=167 op=LOAD Dec 13 02:04:35.833000 audit[3779]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc87b7c6e0 a2=74 a3=540051 items=0 ppid=3639 pid=3779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.833000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:04:35.840000 audit: BPF prog-id=167 op=UNLOAD Dec 13 02:04:35.840000 audit[3779]: AVC avc: denied { bpf } for pid=3779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.840000 audit[3779]: AVC avc: denied { bpf } for pid=3779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.840000 audit[3779]: AVC avc: denied { perfmon } for pid=3779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.840000 audit[3779]: AVC avc: denied { perfmon } for pid=3779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.840000 audit[3779]: AVC avc: denied { perfmon } for pid=3779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.840000 audit[3779]: AVC avc: denied { perfmon } for pid=3779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.840000 audit[3779]: AVC avc: denied { perfmon } for pid=3779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.840000 audit[3779]: AVC avc: denied { bpf } for pid=3779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.840000 audit[3779]: AVC avc: denied { bpf } for pid=3779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.840000 audit: BPF prog-id=168 op=LOAD Dec 13 02:04:35.840000 audit[3779]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc87b7c710 a2=94 a3=2 items=0 ppid=3639 pid=3779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.840000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:04:35.845000 audit: BPF prog-id=168 op=UNLOAD Dec 13 02:04:35.845000 audit[3779]: AVC avc: denied { bpf } for pid=3779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.845000 audit[3779]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc87b7c5e0 a2=28 a3=0 items=0 ppid=3639 pid=3779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.845000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:04:35.845000 audit[3779]: AVC avc: denied { bpf } for pid=3779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.845000 audit[3779]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc87b7c610 a2=28 a3=0 items=0 ppid=3639 pid=3779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.845000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:04:35.845000 audit[3779]: AVC avc: denied { bpf } for pid=3779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.845000 audit[3779]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc87b7c520 a2=28 a3=0 items=0 ppid=3639 pid=3779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.845000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:04:35.845000 audit[3779]: AVC avc: denied { bpf } for pid=3779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.845000 audit[3779]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc87b7c630 a2=28 a3=0 items=0 ppid=3639 pid=3779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.845000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:04:35.845000 audit[3779]: AVC avc: denied { bpf } for pid=3779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.845000 audit[3779]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc87b7c610 a2=28 a3=0 items=0 ppid=3639 pid=3779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.845000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:04:35.845000 audit[3779]: AVC avc: denied { bpf } for pid=3779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.845000 audit[3779]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc87b7c600 a2=28 a3=0 items=0 ppid=3639 pid=3779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.845000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:04:35.845000 audit[3779]: AVC avc: denied { bpf } for pid=3779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.845000 audit[3779]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc87b7c630 a2=28 a3=0 items=0 ppid=3639 pid=3779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.845000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:04:35.850000 audit[3779]: AVC avc: denied { bpf } for pid=3779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.850000 audit[3779]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc87b7c630 a2=28 a3=0 items=0 ppid=3639 pid=3779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.850000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:04:35.859000 audit[3779]: AVC avc: denied { bpf } for pid=3779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.859000 audit[3779]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc87b7c600 a2=28 a3=0 items=0 ppid=3639 pid=3779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.859000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:04:35.859000 audit[3779]: AVC avc: denied { bpf } for pid=3779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.859000 audit[3779]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc87b7c670 a2=28 a3=0 items=0 ppid=3639 pid=3779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.859000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:04:35.859000 audit[3779]: AVC avc: denied { bpf } for pid=3779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.859000 audit[3779]: AVC avc: denied { bpf } for pid=3779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.859000 audit[3779]: AVC avc: denied { perfmon } for pid=3779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.859000 audit[3779]: AVC avc: denied { perfmon } for pid=3779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.859000 audit[3779]: AVC avc: denied { perfmon } for pid=3779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.859000 audit[3779]: AVC avc: denied { perfmon } for pid=3779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.859000 audit[3779]: AVC avc: denied { perfmon } for pid=3779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.859000 audit[3779]: AVC avc: denied { bpf } for pid=3779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.859000 audit[3779]: AVC avc: denied { bpf } for pid=3779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.859000 audit: BPF prog-id=169 op=LOAD Dec 13 02:04:35.859000 audit[3779]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc87b7c4e0 a2=40 a3=0 items=0 ppid=3639 pid=3779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.859000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:04:35.859000 audit: BPF prog-id=169 op=UNLOAD Dec 13 02:04:35.859000 audit[3779]: AVC avc: denied { bpf } for pid=3779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.859000 audit[3779]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffc87b7c4d0 a2=50 a3=2800 items=0 ppid=3639 pid=3779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.859000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:04:35.859000 audit[3779]: AVC avc: denied { bpf } for pid=3779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.859000 audit[3779]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffc87b7c4d0 a2=50 a3=2800 items=0 ppid=3639 pid=3779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.859000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:04:35.859000 audit[3779]: AVC avc: denied { bpf } for pid=3779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.859000 audit[3779]: AVC avc: denied { bpf } for pid=3779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.859000 audit[3779]: AVC avc: denied { bpf } for pid=3779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.859000 audit[3779]: AVC avc: denied { perfmon } for pid=3779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.859000 audit[3779]: AVC avc: denied { perfmon } for pid=3779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.859000 audit[3779]: AVC avc: denied { perfmon } for pid=3779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.859000 audit[3779]: AVC avc: denied { perfmon } for pid=3779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.859000 audit[3779]: AVC avc: denied { perfmon } for pid=3779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.859000 audit[3779]: AVC avc: denied { bpf } for pid=3779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.859000 audit[3779]: AVC avc: denied { bpf } for pid=3779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.859000 audit: BPF prog-id=170 op=LOAD Dec 13 02:04:35.859000 audit[3779]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc87b7bcf0 a2=94 a3=2 items=0 ppid=3639 pid=3779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.859000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:04:35.859000 audit: BPF prog-id=170 op=UNLOAD Dec 13 02:04:35.859000 audit[3779]: AVC avc: denied { bpf } for pid=3779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.859000 audit[3779]: AVC avc: denied { bpf } for pid=3779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.859000 audit[3779]: AVC avc: denied { bpf } for pid=3779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.859000 audit[3779]: AVC avc: denied { perfmon } for pid=3779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.859000 audit[3779]: AVC avc: denied { perfmon } for pid=3779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.859000 audit[3779]: AVC avc: denied { perfmon } for pid=3779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.859000 audit[3779]: AVC avc: denied { perfmon } for pid=3779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.859000 audit[3779]: AVC avc: denied { perfmon } for pid=3779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.859000 audit[3779]: AVC avc: denied { bpf } for pid=3779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.859000 audit[3779]: AVC avc: denied { bpf } for pid=3779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.859000 audit: BPF prog-id=171 op=LOAD Dec 13 02:04:35.859000 audit[3779]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc87b7bdf0 a2=94 a3=2d items=0 ppid=3639 pid=3779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.859000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:04:35.862000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.862000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.862000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.862000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.862000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.862000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.862000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.862000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.862000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.862000 audit: BPF prog-id=172 op=LOAD Dec 13 02:04:35.862000 audit[3787]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffff4e56210 a2=98 a3=0 items=0 ppid=3639 pid=3787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.862000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:04:35.862000 audit: BPF prog-id=172 op=UNLOAD Dec 13 02:04:35.862000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.862000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.862000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.862000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.862000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.862000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.862000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.862000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.862000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.862000 audit: BPF prog-id=173 op=LOAD Dec 13 02:04:35.862000 audit[3787]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffff4e55ff0 a2=74 a3=540051 items=0 ppid=3639 pid=3787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.862000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:04:35.863000 audit: BPF prog-id=173 op=UNLOAD Dec 13 02:04:35.863000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.863000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.863000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.863000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.863000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.863000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.863000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.863000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.863000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.863000 audit: BPF prog-id=174 op=LOAD Dec 13 02:04:35.863000 audit[3787]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffff4e56020 a2=94 a3=2 items=0 ppid=3639 pid=3787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.863000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:04:35.863000 audit: BPF prog-id=174 op=UNLOAD Dec 13 02:04:35.869063 kubelet[1930]: E1213 02:04:35.869004 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:04:35.882526 kubelet[1930]: I1213 02:04:35.882469 1930 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-9zn6q" podStartSLOduration=40.882447719 podStartE2EDuration="40.882447719s" podCreationTimestamp="2024-12-13 02:03:55 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:04:35.879803859 +0000 UTC m=+46.252010172" watchObservedRunningTime="2024-12-13 02:04:35.882447719 +0000 UTC m=+46.254654011" Dec 13 02:04:35.893000 audit[3789]: NETFILTER_CFG table=filter:97 family=2 entries=16 op=nft_register_rule pid=3789 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:04:35.893000 audit[3789]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe71ab6730 a2=0 a3=7ffe71ab671c items=0 ppid=2114 pid=3789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.893000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:04:35.903000 audit[3789]: NETFILTER_CFG table=nat:98 family=2 entries=14 op=nft_register_rule pid=3789 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:04:35.903000 audit[3789]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffe71ab6730 a2=0 a3=0 items=0 ppid=2114 pid=3789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.903000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:04:35.914000 audit[3791]: NETFILTER_CFG table=filter:99 family=2 entries=13 op=nft_register_rule pid=3791 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:04:35.914000 audit[3791]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffcf3ff6340 a2=0 a3=7ffcf3ff632c items=0 ppid=2114 pid=3791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.914000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:04:35.921000 audit[3791]: NETFILTER_CFG table=nat:100 family=2 entries=35 op=nft_register_chain pid=3791 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:04:35.921000 audit[3791]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffcf3ff6340 a2=0 a3=7ffcf3ff632c items=0 ppid=2114 pid=3791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.921000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:04:35.977393 systemd[1]: Started sshd@9-10.0.0.95:22-10.0.0.1:51352.service. Dec 13 02:04:35.976000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.95:22-10.0.0.1:51352 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:35.995000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.995000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.995000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.995000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.995000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.995000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.995000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.995000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.995000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.995000 audit: BPF prog-id=175 op=LOAD Dec 13 02:04:35.995000 audit[3787]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffff4e55ee0 a2=40 a3=1 items=0 ppid=3639 pid=3787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.995000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:04:35.995000 audit: BPF prog-id=175 op=UNLOAD Dec 13 02:04:35.995000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:35.995000 audit[3787]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffff4e55fb0 a2=50 a3=7ffff4e56090 items=0 ppid=3639 pid=3787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:35.995000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:04:36.003000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.003000 audit[3787]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffff4e55ef0 a2=28 a3=0 items=0 ppid=3639 pid=3787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:36.003000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:04:36.003000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.003000 audit[3787]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffff4e55f20 a2=28 a3=0 items=0 ppid=3639 pid=3787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:36.003000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:04:36.003000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.003000 audit[3787]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffff4e55e30 a2=28 a3=0 items=0 ppid=3639 pid=3787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:36.003000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:04:36.003000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.003000 audit[3787]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffff4e55f40 a2=28 a3=0 items=0 ppid=3639 pid=3787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:36.003000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:04:36.003000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.003000 audit[3787]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffff4e55f20 a2=28 a3=0 items=0 ppid=3639 pid=3787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:36.003000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:04:36.003000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.003000 audit[3787]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffff4e55f10 a2=28 a3=0 items=0 ppid=3639 pid=3787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:36.003000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:04:36.003000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.003000 audit[3787]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffff4e55f40 a2=28 a3=0 items=0 ppid=3639 pid=3787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:36.003000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:04:36.003000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.003000 audit[3787]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffff4e55f20 a2=28 a3=0 items=0 ppid=3639 pid=3787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:36.003000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:04:36.003000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.003000 audit[3787]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffff4e55f40 a2=28 a3=0 items=0 ppid=3639 pid=3787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:36.003000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:04:36.003000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.003000 audit[3787]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffff4e55f10 a2=28 a3=0 items=0 ppid=3639 pid=3787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:36.003000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:04:36.003000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.003000 audit[3787]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffff4e55f80 a2=28 a3=0 items=0 ppid=3639 pid=3787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:36.003000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:04:36.003000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.003000 audit[3787]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffff4e55d30 a2=50 a3=1 items=0 ppid=3639 pid=3787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:36.003000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:04:36.003000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.003000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.003000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.003000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.003000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.003000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.003000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.003000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.003000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.003000 audit: BPF prog-id=176 op=LOAD Dec 13 02:04:36.003000 audit[3787]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffff4e55d30 a2=94 a3=5 items=0 ppid=3639 pid=3787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:36.003000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:04:36.003000 audit: BPF prog-id=176 op=UNLOAD Dec 13 02:04:36.003000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.003000 audit[3787]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffff4e55de0 a2=50 a3=1 items=0 ppid=3639 pid=3787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:36.003000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:04:36.003000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.003000 audit[3787]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffff4e55f00 a2=4 a3=38 items=0 ppid=3639 pid=3787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:36.003000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:04:36.003000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.003000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.003000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.003000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.003000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.003000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.003000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.003000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.003000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.003000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.003000 audit[3787]: AVC avc: denied { confidentiality } for pid=3787 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:04:36.003000 audit[3787]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffff4e55f50 a2=94 a3=6 items=0 ppid=3639 pid=3787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:36.003000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:04:36.004000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.004000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.004000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.004000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.004000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.004000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.004000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.004000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.004000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.004000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.004000 audit[3787]: AVC avc: denied { confidentiality } for pid=3787 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:04:36.004000 audit[3787]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffff4e55700 a2=94 a3=83 items=0 ppid=3639 pid=3787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:36.004000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:04:36.004000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.004000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.004000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.004000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.004000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.004000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.004000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.004000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.004000 audit[3787]: AVC avc: denied { perfmon } for pid=3787 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.004000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.004000 audit[3787]: AVC avc: denied { confidentiality } for pid=3787 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:04:36.004000 audit[3787]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffff4e55700 a2=94 a3=83 items=0 ppid=3639 pid=3787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:36.004000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:04:36.005000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.005000 audit[3787]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffff4e57140 a2=10 a3=208 items=0 ppid=3639 pid=3787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:36.005000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:04:36.005000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.005000 audit[3787]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffff4e56fe0 a2=10 a3=3 items=0 ppid=3639 pid=3787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:36.005000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:04:36.005000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.005000 audit[3787]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffff4e56f80 a2=10 a3=3 items=0 ppid=3639 pid=3787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:36.005000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:04:36.005000 audit[3787]: AVC avc: denied { bpf } for pid=3787 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:36.005000 audit[3787]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffff4e56f80 a2=10 a3=7 items=0 ppid=3639 pid=3787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:36.005000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:04:36.011000 audit: BPF prog-id=171 op=UNLOAD Dec 13 02:04:36.025000 audit[3794]: USER_ACCT pid=3794 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:36.027527 sshd[3794]: Accepted publickey for core from 10.0.0.1 port 51352 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:04:36.027000 audit[3794]: CRED_ACQ pid=3794 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:36.027000 audit[3794]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf5aca510 a2=3 a3=0 items=0 ppid=1 pid=3794 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:36.027000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:04:36.028953 sshd[3794]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:04:36.035409 systemd[1]: Started session-10.scope. Dec 13 02:04:36.036391 systemd-logind[1186]: New session 10 of user core. Dec 13 02:04:36.041000 audit[3794]: USER_START pid=3794 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:36.043000 audit[3805]: CRED_ACQ pid=3805 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:36.086000 audit[3822]: NETFILTER_CFG table=mangle:101 family=2 entries=16 op=nft_register_chain pid=3822 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:04:36.086000 audit[3822]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffdf71ac5f0 a2=0 a3=7ffdf71ac5dc items=0 ppid=3639 pid=3822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:36.086000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:04:36.096000 audit[3821]: NETFILTER_CFG table=nat:102 family=2 entries=15 op=nft_register_chain pid=3821 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:04:36.096000 audit[3821]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7fffccd13c80 a2=0 a3=7fffccd13c6c items=0 ppid=3639 pid=3821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:36.096000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:04:36.103000 audit[3823]: NETFILTER_CFG table=raw:103 family=2 entries=21 op=nft_register_chain pid=3823 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:04:36.103000 audit[3823]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffee1207fd0 a2=0 a3=7ffee1207fbc items=0 ppid=3639 pid=3823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:36.103000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:04:36.112000 audit[3837]: NETFILTER_CFG table=filter:104 family=2 entries=135 op=nft_register_chain pid=3837 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:04:36.112000 audit[3837]: SYSCALL arch=c000003e syscall=46 success=yes exit=75620 a0=3 a1=7ffd4766e510 a2=0 a3=7ffd4766e4fc items=0 ppid=3639 pid=3837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:36.112000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:04:36.169340 sshd[3794]: pam_unix(sshd:session): session closed for user core Dec 13 02:04:36.169000 audit[3794]: USER_END pid=3794 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:36.169000 audit[3794]: CRED_DISP pid=3794 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:36.172490 systemd[1]: sshd@9-10.0.0.95:22-10.0.0.1:51352.service: Deactivated successfully. Dec 13 02:04:36.171000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.95:22-10.0.0.1:51352 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:36.173480 systemd[1]: session-10.scope: Deactivated successfully. Dec 13 02:04:36.174130 systemd-logind[1186]: Session 10 logged out. Waiting for processes to exit. Dec 13 02:04:36.174972 systemd-logind[1186]: Removed session 10. Dec 13 02:04:36.703699 env[1201]: time="2024-12-13T02:04:36.703583410Z" level=info msg="StopPodSandbox for \"b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8\"" Dec 13 02:04:36.784900 env[1201]: 2024-12-13 02:04:36.753 [INFO][3860] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8" Dec 13 02:04:36.784900 env[1201]: 2024-12-13 02:04:36.754 [INFO][3860] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8" iface="eth0" netns="/var/run/netns/cni-0f744740-1a0c-4930-87cd-5a0fda26d826" Dec 13 02:04:36.784900 env[1201]: 2024-12-13 02:04:36.754 [INFO][3860] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8" iface="eth0" netns="/var/run/netns/cni-0f744740-1a0c-4930-87cd-5a0fda26d826" Dec 13 02:04:36.784900 env[1201]: 2024-12-13 02:04:36.754 [INFO][3860] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8" iface="eth0" netns="/var/run/netns/cni-0f744740-1a0c-4930-87cd-5a0fda26d826" Dec 13 02:04:36.784900 env[1201]: 2024-12-13 02:04:36.754 [INFO][3860] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8" Dec 13 02:04:36.784900 env[1201]: 2024-12-13 02:04:36.754 [INFO][3860] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8" Dec 13 02:04:36.784900 env[1201]: 2024-12-13 02:04:36.774 [INFO][3867] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8" HandleID="k8s-pod-network.b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8" Workload="localhost-k8s-csi--node--driver--559bn-eth0" Dec 13 02:04:36.784900 env[1201]: 2024-12-13 02:04:36.774 [INFO][3867] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:04:36.784900 env[1201]: 2024-12-13 02:04:36.774 [INFO][3867] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:04:36.784900 env[1201]: 2024-12-13 02:04:36.780 [WARNING][3867] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8" HandleID="k8s-pod-network.b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8" Workload="localhost-k8s-csi--node--driver--559bn-eth0" Dec 13 02:04:36.784900 env[1201]: 2024-12-13 02:04:36.780 [INFO][3867] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8" HandleID="k8s-pod-network.b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8" Workload="localhost-k8s-csi--node--driver--559bn-eth0" Dec 13 02:04:36.784900 env[1201]: 2024-12-13 02:04:36.781 [INFO][3867] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:04:36.784900 env[1201]: 2024-12-13 02:04:36.783 [INFO][3860] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8" Dec 13 02:04:36.785402 env[1201]: time="2024-12-13T02:04:36.785035685Z" level=info msg="TearDown network for sandbox \"b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8\" successfully" Dec 13 02:04:36.785402 env[1201]: time="2024-12-13T02:04:36.785066025Z" level=info msg="StopPodSandbox for \"b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8\" returns successfully" Dec 13 02:04:36.788258 env[1201]: time="2024-12-13T02:04:36.788231842Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-559bn,Uid:691da589-3611-4441-99b1-bbdb62900b38,Namespace:calico-system,Attempt:1,}" Dec 13 02:04:36.788276 systemd[1]: run-netns-cni\x2d0f744740\x2d1a0c\x2d4930\x2d87cd\x2d5a0fda26d826.mount: Deactivated successfully. Dec 13 02:04:36.872879 kubelet[1930]: E1213 02:04:36.872843 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:04:36.895411 systemd-networkd[1025]: cali7759d33f942: Gained IPv6LL Dec 13 02:04:37.023378 systemd-networkd[1025]: cali0bc93bb69ef: Gained IPv6LL Dec 13 02:04:37.047853 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:04:37.047965 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calied9d19c0b5f: link becomes ready Dec 13 02:04:37.048050 systemd-networkd[1025]: calied9d19c0b5f: Link UP Dec 13 02:04:37.048324 systemd-networkd[1025]: calied9d19c0b5f: Gained carrier Dec 13 02:04:37.087687 systemd-networkd[1025]: cali32538723edb: Gained IPv6LL Dec 13 02:04:37.092339 env[1201]: 2024-12-13 02:04:36.842 [INFO][3875] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--559bn-eth0 csi-node-driver- calico-system 691da589-3611-4441-99b1-bbdb62900b38 927 0 2024-12-13 02:04:04 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:56747c9949 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-559bn eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calied9d19c0b5f [] []}} ContainerID="9386ec7e0fbf00c0b0a7ad57fc0b8586787813f2d3884e21482519aeb8c3977e" Namespace="calico-system" Pod="csi-node-driver-559bn" WorkloadEndpoint="localhost-k8s-csi--node--driver--559bn-" Dec 13 02:04:37.092339 env[1201]: 2024-12-13 02:04:36.842 [INFO][3875] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="9386ec7e0fbf00c0b0a7ad57fc0b8586787813f2d3884e21482519aeb8c3977e" Namespace="calico-system" Pod="csi-node-driver-559bn" WorkloadEndpoint="localhost-k8s-csi--node--driver--559bn-eth0" Dec 13 02:04:37.092339 env[1201]: 2024-12-13 02:04:36.894 [INFO][3889] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9386ec7e0fbf00c0b0a7ad57fc0b8586787813f2d3884e21482519aeb8c3977e" HandleID="k8s-pod-network.9386ec7e0fbf00c0b0a7ad57fc0b8586787813f2d3884e21482519aeb8c3977e" Workload="localhost-k8s-csi--node--driver--559bn-eth0" Dec 13 02:04:37.092339 env[1201]: 2024-12-13 02:04:36.904 [INFO][3889] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="9386ec7e0fbf00c0b0a7ad57fc0b8586787813f2d3884e21482519aeb8c3977e" HandleID="k8s-pod-network.9386ec7e0fbf00c0b0a7ad57fc0b8586787813f2d3884e21482519aeb8c3977e" Workload="localhost-k8s-csi--node--driver--559bn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0001fc130), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-559bn", "timestamp":"2024-12-13 02:04:36.894320625 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:04:37.092339 env[1201]: 2024-12-13 02:04:36.904 [INFO][3889] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:04:37.092339 env[1201]: 2024-12-13 02:04:36.904 [INFO][3889] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:04:37.092339 env[1201]: 2024-12-13 02:04:36.904 [INFO][3889] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 02:04:37.092339 env[1201]: 2024-12-13 02:04:36.907 [INFO][3889] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.9386ec7e0fbf00c0b0a7ad57fc0b8586787813f2d3884e21482519aeb8c3977e" host="localhost" Dec 13 02:04:37.092339 env[1201]: 2024-12-13 02:04:36.910 [INFO][3889] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 02:04:37.092339 env[1201]: 2024-12-13 02:04:36.915 [INFO][3889] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 02:04:37.092339 env[1201]: 2024-12-13 02:04:36.916 [INFO][3889] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 02:04:37.092339 env[1201]: 2024-12-13 02:04:36.918 [INFO][3889] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 02:04:37.092339 env[1201]: 2024-12-13 02:04:36.918 [INFO][3889] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.9386ec7e0fbf00c0b0a7ad57fc0b8586787813f2d3884e21482519aeb8c3977e" host="localhost" Dec 13 02:04:37.092339 env[1201]: 2024-12-13 02:04:36.920 [INFO][3889] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.9386ec7e0fbf00c0b0a7ad57fc0b8586787813f2d3884e21482519aeb8c3977e Dec 13 02:04:37.092339 env[1201]: 2024-12-13 02:04:36.924 [INFO][3889] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.9386ec7e0fbf00c0b0a7ad57fc0b8586787813f2d3884e21482519aeb8c3977e" host="localhost" Dec 13 02:04:37.092339 env[1201]: 2024-12-13 02:04:37.037 [INFO][3889] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.9386ec7e0fbf00c0b0a7ad57fc0b8586787813f2d3884e21482519aeb8c3977e" host="localhost" Dec 13 02:04:37.092339 env[1201]: 2024-12-13 02:04:37.037 [INFO][3889] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.9386ec7e0fbf00c0b0a7ad57fc0b8586787813f2d3884e21482519aeb8c3977e" host="localhost" Dec 13 02:04:37.092339 env[1201]: 2024-12-13 02:04:37.037 [INFO][3889] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:04:37.092339 env[1201]: 2024-12-13 02:04:37.037 [INFO][3889] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="9386ec7e0fbf00c0b0a7ad57fc0b8586787813f2d3884e21482519aeb8c3977e" HandleID="k8s-pod-network.9386ec7e0fbf00c0b0a7ad57fc0b8586787813f2d3884e21482519aeb8c3977e" Workload="localhost-k8s-csi--node--driver--559bn-eth0" Dec 13 02:04:37.093008 env[1201]: 2024-12-13 02:04:37.043 [INFO][3875] cni-plugin/k8s.go 386: Populated endpoint ContainerID="9386ec7e0fbf00c0b0a7ad57fc0b8586787813f2d3884e21482519aeb8c3977e" Namespace="calico-system" Pod="csi-node-driver-559bn" WorkloadEndpoint="localhost-k8s-csi--node--driver--559bn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--559bn-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"691da589-3611-4441-99b1-bbdb62900b38", ResourceVersion:"927", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 4, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-559bn", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calied9d19c0b5f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:04:37.093008 env[1201]: 2024-12-13 02:04:37.043 [INFO][3875] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="9386ec7e0fbf00c0b0a7ad57fc0b8586787813f2d3884e21482519aeb8c3977e" Namespace="calico-system" Pod="csi-node-driver-559bn" WorkloadEndpoint="localhost-k8s-csi--node--driver--559bn-eth0" Dec 13 02:04:37.093008 env[1201]: 2024-12-13 02:04:37.043 [INFO][3875] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calied9d19c0b5f ContainerID="9386ec7e0fbf00c0b0a7ad57fc0b8586787813f2d3884e21482519aeb8c3977e" Namespace="calico-system" Pod="csi-node-driver-559bn" WorkloadEndpoint="localhost-k8s-csi--node--driver--559bn-eth0" Dec 13 02:04:37.093008 env[1201]: 2024-12-13 02:04:37.048 [INFO][3875] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="9386ec7e0fbf00c0b0a7ad57fc0b8586787813f2d3884e21482519aeb8c3977e" Namespace="calico-system" Pod="csi-node-driver-559bn" WorkloadEndpoint="localhost-k8s-csi--node--driver--559bn-eth0" Dec 13 02:04:37.093008 env[1201]: 2024-12-13 02:04:37.048 [INFO][3875] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="9386ec7e0fbf00c0b0a7ad57fc0b8586787813f2d3884e21482519aeb8c3977e" Namespace="calico-system" Pod="csi-node-driver-559bn" WorkloadEndpoint="localhost-k8s-csi--node--driver--559bn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--559bn-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"691da589-3611-4441-99b1-bbdb62900b38", ResourceVersion:"927", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 4, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"9386ec7e0fbf00c0b0a7ad57fc0b8586787813f2d3884e21482519aeb8c3977e", Pod:"csi-node-driver-559bn", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calied9d19c0b5f", MAC:"ae:14:6d:c2:83:ac", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:04:37.093008 env[1201]: 2024-12-13 02:04:37.090 [INFO][3875] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="9386ec7e0fbf00c0b0a7ad57fc0b8586787813f2d3884e21482519aeb8c3977e" Namespace="calico-system" Pod="csi-node-driver-559bn" WorkloadEndpoint="localhost-k8s-csi--node--driver--559bn-eth0" Dec 13 02:04:37.103000 audit[3912]: NETFILTER_CFG table=filter:105 family=2 entries=42 op=nft_register_chain pid=3912 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:04:37.103000 audit[3912]: SYSCALL arch=c000003e syscall=46 success=yes exit=21016 a0=3 a1=7ffe15f9e310 a2=0 a3=7ffe15f9e2fc items=0 ppid=3639 pid=3912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:37.103000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:04:37.142042 env[1201]: time="2024-12-13T02:04:37.141958500Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:04:37.142042 env[1201]: time="2024-12-13T02:04:37.142016294Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:04:37.142042 env[1201]: time="2024-12-13T02:04:37.142032066Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:04:37.142282 env[1201]: time="2024-12-13T02:04:37.142220308Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9386ec7e0fbf00c0b0a7ad57fc0b8586787813f2d3884e21482519aeb8c3977e pid=3920 runtime=io.containerd.runc.v2 Dec 13 02:04:37.167449 systemd[1]: Started cri-containerd-9386ec7e0fbf00c0b0a7ad57fc0b8586787813f2d3884e21482519aeb8c3977e.scope. Dec 13 02:04:37.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.179000 audit: BPF prog-id=177 op=LOAD Dec 13 02:04:37.179000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.179000 audit[3930]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3920 pid=3930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:37.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933383665633765306662663030633062306137616435376663306238 Dec 13 02:04:37.179000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.179000 audit[3930]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3920 pid=3930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:37.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933383665633765306662663030633062306137616435376663306238 Dec 13 02:04:37.179000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.179000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.179000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.179000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.179000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.179000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.179000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.179000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.179000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.179000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.179000 audit: BPF prog-id=178 op=LOAD Dec 13 02:04:37.179000 audit[3930]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c00020dac0 items=0 ppid=3920 pid=3930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:37.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933383665633765306662663030633062306137616435376663306238 Dec 13 02:04:37.180000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.180000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.180000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.180000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.180000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.180000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.180000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.180000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.180000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.180000 audit: BPF prog-id=179 op=LOAD Dec 13 02:04:37.180000 audit[3930]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c00020db08 items=0 ppid=3920 pid=3930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:37.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933383665633765306662663030633062306137616435376663306238 Dec 13 02:04:37.180000 audit: BPF prog-id=179 op=UNLOAD Dec 13 02:04:37.180000 audit: BPF prog-id=178 op=UNLOAD Dec 13 02:04:37.180000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.180000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.180000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.180000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.180000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.180000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.180000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.180000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.180000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.180000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.180000 audit: BPF prog-id=180 op=LOAD Dec 13 02:04:37.180000 audit[3930]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c00020df18 items=0 ppid=3920 pid=3930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:37.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933383665633765306662663030633062306137616435376663306238 Dec 13 02:04:37.182329 systemd-resolved[1139]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 02:04:37.191807 env[1201]: time="2024-12-13T02:04:37.191754268Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-559bn,Uid:691da589-3611-4441-99b1-bbdb62900b38,Namespace:calico-system,Attempt:1,} returns sandbox id \"9386ec7e0fbf00c0b0a7ad57fc0b8586787813f2d3884e21482519aeb8c3977e\"" Dec 13 02:04:37.545551 env[1201]: time="2024-12-13T02:04:37.545482650Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:37.547554 env[1201]: time="2024-12-13T02:04:37.547511708Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:37.548910 env[1201]: time="2024-12-13T02:04:37.548868718Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:37.550269 env[1201]: time="2024-12-13T02:04:37.550235758Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:37.550628 env[1201]: time="2024-12-13T02:04:37.550589657Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da\"" Dec 13 02:04:37.551602 env[1201]: time="2024-12-13T02:04:37.551577228Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 02:04:37.556892 env[1201]: time="2024-12-13T02:04:37.556856115Z" level=info msg="CreateContainer within sandbox \"61fc3a651d5175a79ac855d09cd95783ef94a6f5768ca9577d790f6f63b62bf3\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 02:04:37.571533 env[1201]: time="2024-12-13T02:04:37.571468418Z" level=info msg="CreateContainer within sandbox \"61fc3a651d5175a79ac855d09cd95783ef94a6f5768ca9577d790f6f63b62bf3\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"32960b14428542e503779e67e0ee1f0c18752d5705b95f333a06b3bf1ecbddcd\"" Dec 13 02:04:37.572071 env[1201]: time="2024-12-13T02:04:37.572043112Z" level=info msg="StartContainer for \"32960b14428542e503779e67e0ee1f0c18752d5705b95f333a06b3bf1ecbddcd\"" Dec 13 02:04:37.587783 systemd[1]: Started cri-containerd-32960b14428542e503779e67e0ee1f0c18752d5705b95f333a06b3bf1ecbddcd.scope. Dec 13 02:04:37.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.605000 audit: BPF prog-id=181 op=LOAD Dec 13 02:04:37.606000 audit[3964]: AVC avc: denied { bpf } for pid=3964 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.606000 audit[3964]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3510 pid=3964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:37.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332393630623134343238353432653530333737396536376530656531 Dec 13 02:04:37.606000 audit[3964]: AVC avc: denied { perfmon } for pid=3964 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.606000 audit[3964]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3510 pid=3964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:37.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332393630623134343238353432653530333737396536376530656531 Dec 13 02:04:37.606000 audit[3964]: AVC avc: denied { bpf } for pid=3964 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.606000 audit[3964]: AVC avc: denied { bpf } for pid=3964 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.606000 audit[3964]: AVC avc: denied { bpf } for pid=3964 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.606000 audit[3964]: AVC avc: denied { perfmon } for pid=3964 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.606000 audit[3964]: AVC avc: denied { perfmon } for pid=3964 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.606000 audit[3964]: AVC avc: denied { perfmon } for pid=3964 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.606000 audit[3964]: AVC avc: denied { perfmon } for pid=3964 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.606000 audit[3964]: AVC avc: denied { perfmon } for pid=3964 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.606000 audit[3964]: AVC avc: denied { bpf } for pid=3964 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.606000 audit[3964]: AVC avc: denied { bpf } for pid=3964 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.606000 audit: BPF prog-id=182 op=LOAD Dec 13 02:04:37.606000 audit[3964]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000300ae0 items=0 ppid=3510 pid=3964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:37.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332393630623134343238353432653530333737396536376530656531 Dec 13 02:04:37.606000 audit[3964]: AVC avc: denied { bpf } for pid=3964 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.606000 audit[3964]: AVC avc: denied { bpf } for pid=3964 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.606000 audit[3964]: AVC avc: denied { perfmon } for pid=3964 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.606000 audit[3964]: AVC avc: denied { perfmon } for pid=3964 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.606000 audit[3964]: AVC avc: denied { perfmon } for pid=3964 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.606000 audit[3964]: AVC avc: denied { perfmon } for pid=3964 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.606000 audit[3964]: AVC avc: denied { perfmon } for pid=3964 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.606000 audit[3964]: AVC avc: denied { bpf } for pid=3964 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.606000 audit[3964]: AVC avc: denied { bpf } for pid=3964 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.606000 audit: BPF prog-id=183 op=LOAD Dec 13 02:04:37.606000 audit[3964]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000300b28 items=0 ppid=3510 pid=3964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:37.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332393630623134343238353432653530333737396536376530656531 Dec 13 02:04:37.606000 audit: BPF prog-id=183 op=UNLOAD Dec 13 02:04:37.606000 audit: BPF prog-id=182 op=UNLOAD Dec 13 02:04:37.606000 audit[3964]: AVC avc: denied { bpf } for pid=3964 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.606000 audit[3964]: AVC avc: denied { bpf } for pid=3964 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.606000 audit[3964]: AVC avc: denied { bpf } for pid=3964 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.606000 audit[3964]: AVC avc: denied { perfmon } for pid=3964 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.606000 audit[3964]: AVC avc: denied { perfmon } for pid=3964 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.606000 audit[3964]: AVC avc: denied { perfmon } for pid=3964 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.606000 audit[3964]: AVC avc: denied { perfmon } for pid=3964 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.606000 audit[3964]: AVC avc: denied { perfmon } for pid=3964 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.606000 audit[3964]: AVC avc: denied { bpf } for pid=3964 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.606000 audit[3964]: AVC avc: denied { bpf } for pid=3964 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:37.606000 audit: BPF prog-id=184 op=LOAD Dec 13 02:04:37.606000 audit[3964]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000300f38 items=0 ppid=3510 pid=3964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:37.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332393630623134343238353432653530333737396536376530656531 Dec 13 02:04:37.735798 env[1201]: time="2024-12-13T02:04:37.735717525Z" level=info msg="StartContainer for \"32960b14428542e503779e67e0ee1f0c18752d5705b95f333a06b3bf1ecbddcd\" returns successfully" Dec 13 02:04:37.789344 systemd[1]: run-containerd-runc-k8s.io-9386ec7e0fbf00c0b0a7ad57fc0b8586787813f2d3884e21482519aeb8c3977e-runc.uiLboA.mount: Deactivated successfully. Dec 13 02:04:37.791711 systemd-networkd[1025]: vxlan.calico: Gained IPv6LL Dec 13 02:04:37.877171 kubelet[1930]: E1213 02:04:37.877062 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:04:37.894004 systemd[1]: run-containerd-runc-k8s.io-32960b14428542e503779e67e0ee1f0c18752d5705b95f333a06b3bf1ecbddcd-runc.z2Qqq6.mount: Deactivated successfully. Dec 13 02:04:38.028774 kubelet[1930]: I1213 02:04:38.028534 1930 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-6f7685584c-tn7w2" podStartSLOduration=31.666854249 podStartE2EDuration="34.02851061s" podCreationTimestamp="2024-12-13 02:04:04 +0000 UTC" firstStartedPulling="2024-12-13 02:04:35.1897656 +0000 UTC m=+45.561971892" lastFinishedPulling="2024-12-13 02:04:37.551421961 +0000 UTC m=+47.923628253" observedRunningTime="2024-12-13 02:04:38.014227928 +0000 UTC m=+48.386434240" watchObservedRunningTime="2024-12-13 02:04:38.02851061 +0000 UTC m=+48.400716902" Dec 13 02:04:38.111494 systemd-networkd[1025]: calied9d19c0b5f: Gained IPv6LL Dec 13 02:04:40.186099 env[1201]: time="2024-12-13T02:04:40.186047201Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:40.188020 env[1201]: time="2024-12-13T02:04:40.187980032Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:40.189690 env[1201]: time="2024-12-13T02:04:40.189632750Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:40.191385 env[1201]: time="2024-12-13T02:04:40.191362560Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:40.191822 env[1201]: time="2024-12-13T02:04:40.191799291Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 02:04:40.192883 env[1201]: time="2024-12-13T02:04:40.192852668Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 02:04:40.194057 env[1201]: time="2024-12-13T02:04:40.193994177Z" level=info msg="CreateContainer within sandbox \"6d11c7f94fff1f9af410bd51e47b60361194998dda5fcd0346c76b30094c30af\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 02:04:40.207676 env[1201]: time="2024-12-13T02:04:40.207628767Z" level=info msg="CreateContainer within sandbox \"6d11c7f94fff1f9af410bd51e47b60361194998dda5fcd0346c76b30094c30af\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"6152823a42828090ca0daef4ddcf01e4166e54e9c2cfb72a95035dcb92c42c90\"" Dec 13 02:04:40.208142 env[1201]: time="2024-12-13T02:04:40.208100327Z" level=info msg="StartContainer for \"6152823a42828090ca0daef4ddcf01e4166e54e9c2cfb72a95035dcb92c42c90\"" Dec 13 02:04:40.227320 systemd[1]: Started cri-containerd-6152823a42828090ca0daef4ddcf01e4166e54e9c2cfb72a95035dcb92c42c90.scope. Dec 13 02:04:40.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:40.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:40.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:40.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:40.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:40.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:40.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:40.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:40.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:40.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:40.237000 audit: BPF prog-id=185 op=LOAD Dec 13 02:04:40.237000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:40.237000 audit[4021]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3581 pid=4021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:40.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631353238323361343238323830393063613064616566346464636630 Dec 13 02:04:40.237000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:40.237000 audit[4021]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3581 pid=4021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:40.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631353238323361343238323830393063613064616566346464636630 Dec 13 02:04:40.237000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:40.237000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:40.237000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:40.237000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:40.237000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:40.237000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:40.237000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:40.237000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:40.237000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:40.237000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:40.237000 audit: BPF prog-id=186 op=LOAD Dec 13 02:04:40.237000 audit[4021]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000274a50 items=0 ppid=3581 pid=4021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:40.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631353238323361343238323830393063613064616566346464636630 Dec 13 02:04:40.238000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:40.238000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:40.238000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:40.238000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:40.238000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:40.238000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:40.238000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:40.238000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:40.238000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:40.238000 audit: BPF prog-id=187 op=LOAD Dec 13 02:04:40.238000 audit[4021]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000274a98 items=0 ppid=3581 pid=4021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:40.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631353238323361343238323830393063613064616566346464636630 Dec 13 02:04:40.238000 audit: BPF prog-id=187 op=UNLOAD Dec 13 02:04:40.238000 audit: BPF prog-id=186 op=UNLOAD Dec 13 02:04:40.238000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:40.238000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:40.238000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:40.238000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:40.238000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:40.238000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:40.238000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:40.238000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:40.238000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:40.238000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:40.238000 audit: BPF prog-id=188 op=LOAD Dec 13 02:04:40.238000 audit[4021]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000274ea8 items=0 ppid=3581 pid=4021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:40.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631353238323361343238323830393063613064616566346464636630 Dec 13 02:04:40.263614 env[1201]: time="2024-12-13T02:04:40.263565500Z" level=info msg="StartContainer for \"6152823a42828090ca0daef4ddcf01e4166e54e9c2cfb72a95035dcb92c42c90\" returns successfully" Dec 13 02:04:40.968000 audit[4052]: NETFILTER_CFG table=filter:106 family=2 entries=10 op=nft_register_rule pid=4052 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:04:40.971056 kernel: kauditd_printk_skb: 479 callbacks suppressed Dec 13 02:04:40.971135 kernel: audit: type=1325 audit(1734055480.968:1266): table=filter:106 family=2 entries=10 op=nft_register_rule pid=4052 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:04:40.968000 audit[4052]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffcb78188f0 a2=0 a3=7ffcb78188dc items=0 ppid=2114 pid=4052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:40.978858 kernel: audit: type=1300 audit(1734055480.968:1266): arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffcb78188f0 a2=0 a3=7ffcb78188dc items=0 ppid=2114 pid=4052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:40.978942 kernel: audit: type=1327 audit(1734055480.968:1266): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:04:40.968000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:04:40.985000 audit[4052]: NETFILTER_CFG table=nat:107 family=2 entries=20 op=nft_register_rule pid=4052 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:04:40.985000 audit[4052]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffcb78188f0 a2=0 a3=7ffcb78188dc items=0 ppid=2114 pid=4052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:40.996098 kernel: audit: type=1325 audit(1734055480.985:1267): table=nat:107 family=2 entries=20 op=nft_register_rule pid=4052 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:04:40.996241 kernel: audit: type=1300 audit(1734055480.985:1267): arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffcb78188f0 a2=0 a3=7ffcb78188dc items=0 ppid=2114 pid=4052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:40.996278 kernel: audit: type=1327 audit(1734055480.985:1267): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:04:40.985000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:04:41.174282 systemd[1]: Started sshd@10-10.0.0.95:22-10.0.0.1:42538.service. Dec 13 02:04:41.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.95:22-10.0.0.1:42538 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:41.183269 kernel: audit: type=1130 audit(1734055481.173:1268): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.95:22-10.0.0.1:42538 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:41.228000 audit[4031]: AVC avc: denied { watch } for pid=4031 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_04_22.3511423499/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c410,c795 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c410,c795 tclass=file permissive=0 Dec 13 02:04:41.228000 audit[4031]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000c88a20 a2=fc6 a3=0 items=0 ppid=3581 pid=4031 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c410,c795 key=(null) Dec 13 02:04:41.258058 kernel: audit: type=1400 audit(1734055481.228:1269): avc: denied { watch } for pid=4031 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_04_22.3511423499/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c410,c795 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c410,c795 tclass=file permissive=0 Dec 13 02:04:41.258302 kernel: audit: type=1300 audit(1734055481.228:1269): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000c88a20 a2=fc6 a3=0 items=0 ppid=3581 pid=4031 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c410,c795 key=(null) Dec 13 02:04:41.258350 kernel: audit: type=1327 audit(1734055481.228:1269): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:04:41.228000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:04:41.293784 sshd[4060]: Accepted publickey for core from 10.0.0.1 port 42538 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:04:41.292000 audit[4060]: USER_ACCT pid=4060 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:41.293000 audit[4060]: CRED_ACQ pid=4060 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:41.293000 audit[4060]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd26ec8ac0 a2=3 a3=0 items=0 ppid=1 pid=4060 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:41.293000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:04:41.297037 sshd[4060]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:04:41.302243 systemd-logind[1186]: New session 11 of user core. Dec 13 02:04:41.303299 systemd[1]: Started session-11.scope. Dec 13 02:04:41.308000 audit[4060]: USER_START pid=4060 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:41.310000 audit[4062]: CRED_ACQ pid=4062 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:41.381697 kubelet[1930]: I1213 02:04:41.381341 1930 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-844858f88f-dcngr" podStartSLOduration=32.478356187 podStartE2EDuration="37.381317846s" podCreationTimestamp="2024-12-13 02:04:04 +0000 UTC" firstStartedPulling="2024-12-13 02:04:35.289711214 +0000 UTC m=+45.661917506" lastFinishedPulling="2024-12-13 02:04:40.192672843 +0000 UTC m=+50.564879165" observedRunningTime="2024-12-13 02:04:40.957385378 +0000 UTC m=+51.329591670" watchObservedRunningTime="2024-12-13 02:04:41.381317846 +0000 UTC m=+51.753524138" Dec 13 02:04:41.461000 audit[4073]: NETFILTER_CFG table=filter:108 family=2 entries=9 op=nft_register_rule pid=4073 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:04:41.461000 audit[4073]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffc2788e960 a2=0 a3=7ffc2788e94c items=0 ppid=2114 pid=4073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:41.461000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:04:41.471000 audit[4073]: NETFILTER_CFG table=nat:109 family=2 entries=27 op=nft_register_chain pid=4073 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:04:41.471000 audit[4073]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffc2788e960 a2=0 a3=7ffc2788e94c items=0 ppid=2114 pid=4073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:41.471000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:04:41.502009 sshd[4060]: pam_unix(sshd:session): session closed for user core Dec 13 02:04:41.502000 audit[4060]: USER_END pid=4060 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:41.502000 audit[4060]: CRED_DISP pid=4060 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:41.506211 systemd[1]: sshd@10-10.0.0.95:22-10.0.0.1:42538.service: Deactivated successfully. Dec 13 02:04:41.505000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.95:22-10.0.0.1:42538 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:41.506977 systemd[1]: session-11.scope: Deactivated successfully. Dec 13 02:04:41.507776 systemd-logind[1186]: Session 11 logged out. Waiting for processes to exit. Dec 13 02:04:41.509280 systemd[1]: Started sshd@11-10.0.0.95:22-10.0.0.1:42546.service. Dec 13 02:04:41.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.95:22-10.0.0.1:42546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:41.510254 systemd-logind[1186]: Removed session 11. Dec 13 02:04:41.553000 audit[4077]: USER_ACCT pid=4077 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:41.555266 sshd[4077]: Accepted publickey for core from 10.0.0.1 port 42546 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:04:41.555000 audit[4077]: CRED_ACQ pid=4077 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:41.555000 audit[4077]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea9432180 a2=3 a3=0 items=0 ppid=1 pid=4077 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:41.555000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:04:41.557061 sshd[4077]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:04:41.561851 systemd-logind[1186]: New session 12 of user core. Dec 13 02:04:41.563139 systemd[1]: Started session-12.scope. Dec 13 02:04:41.566000 audit[4077]: USER_START pid=4077 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:41.568000 audit[4079]: CRED_ACQ pid=4079 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:41.867081 sshd[4077]: pam_unix(sshd:session): session closed for user core Dec 13 02:04:41.866000 audit[4077]: USER_END pid=4077 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:41.867000 audit[4077]: CRED_DISP pid=4077 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:41.870785 systemd[1]: sshd@11-10.0.0.95:22-10.0.0.1:42546.service: Deactivated successfully. Dec 13 02:04:41.869000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.95:22-10.0.0.1:42546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:41.871504 systemd[1]: session-12.scope: Deactivated successfully. Dec 13 02:04:41.872036 systemd-logind[1186]: Session 12 logged out. Waiting for processes to exit. Dec 13 02:04:41.873352 systemd[1]: Started sshd@12-10.0.0.95:22-10.0.0.1:42550.service. Dec 13 02:04:41.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.95:22-10.0.0.1:42550 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:41.874284 systemd-logind[1186]: Removed session 12. Dec 13 02:04:41.920000 audit[4088]: USER_ACCT pid=4088 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:41.921926 sshd[4088]: Accepted publickey for core from 10.0.0.1 port 42550 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:04:41.921000 audit[4088]: CRED_ACQ pid=4088 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:41.921000 audit[4088]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc67270ab0 a2=3 a3=0 items=0 ppid=1 pid=4088 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:41.921000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:04:41.923307 sshd[4088]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:04:41.927479 systemd-logind[1186]: New session 13 of user core. Dec 13 02:04:41.928492 systemd[1]: Started session-13.scope. Dec 13 02:04:41.931000 audit[4088]: USER_START pid=4088 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:41.933000 audit[4090]: CRED_ACQ pid=4090 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:42.061488 sshd[4088]: pam_unix(sshd:session): session closed for user core Dec 13 02:04:42.061000 audit[4088]: USER_END pid=4088 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:42.061000 audit[4088]: CRED_DISP pid=4088 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:42.065470 systemd[1]: sshd@12-10.0.0.95:22-10.0.0.1:42550.service: Deactivated successfully. Dec 13 02:04:42.064000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.95:22-10.0.0.1:42550 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:42.066461 systemd[1]: session-13.scope: Deactivated successfully. Dec 13 02:04:42.067135 systemd-logind[1186]: Session 13 logged out. Waiting for processes to exit. Dec 13 02:04:42.068143 systemd-logind[1186]: Removed session 13. Dec 13 02:04:42.417921 env[1201]: time="2024-12-13T02:04:42.417866443Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:42.419887 env[1201]: time="2024-12-13T02:04:42.419854408Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:42.421630 env[1201]: time="2024-12-13T02:04:42.421576509Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:42.423153 env[1201]: time="2024-12-13T02:04:42.423126061Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:42.423684 env[1201]: time="2024-12-13T02:04:42.423654472Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 02:04:42.426181 env[1201]: time="2024-12-13T02:04:42.426151438Z" level=info msg="CreateContainer within sandbox \"9386ec7e0fbf00c0b0a7ad57fc0b8586787813f2d3884e21482519aeb8c3977e\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 02:04:42.441907 env[1201]: time="2024-12-13T02:04:42.441846996Z" level=info msg="CreateContainer within sandbox \"9386ec7e0fbf00c0b0a7ad57fc0b8586787813f2d3884e21482519aeb8c3977e\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"76b8e7f9f54884a68988df503d89b1cd33a912596b69c76a5e635ad7daff9a5a\"" Dec 13 02:04:42.442645 env[1201]: time="2024-12-13T02:04:42.442620499Z" level=info msg="StartContainer for \"76b8e7f9f54884a68988df503d89b1cd33a912596b69c76a5e635ad7daff9a5a\"" Dec 13 02:04:42.462847 systemd[1]: Started cri-containerd-76b8e7f9f54884a68988df503d89b1cd33a912596b69c76a5e635ad7daff9a5a.scope. Dec 13 02:04:42.473000 audit[4109]: AVC avc: denied { perfmon } for pid=4109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:42.473000 audit[4109]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7feb9cda4c28 items=0 ppid=3920 pid=4109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:42.473000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736623865376639663534383834613638393838646635303364383962 Dec 13 02:04:42.473000 audit[4109]: AVC avc: denied { bpf } for pid=4109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:42.473000 audit[4109]: AVC avc: denied { bpf } for pid=4109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:42.473000 audit[4109]: AVC avc: denied { bpf } for pid=4109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:42.473000 audit[4109]: AVC avc: denied { perfmon } for pid=4109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:42.473000 audit[4109]: AVC avc: denied { perfmon } for pid=4109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:42.473000 audit[4109]: AVC avc: denied { perfmon } for pid=4109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:42.473000 audit[4109]: AVC avc: denied { perfmon } for pid=4109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:42.473000 audit[4109]: AVC avc: denied { perfmon } for pid=4109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:42.473000 audit[4109]: AVC avc: denied { bpf } for pid=4109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:42.473000 audit[4109]: AVC avc: denied { bpf } for pid=4109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:42.473000 audit: BPF prog-id=189 op=LOAD Dec 13 02:04:42.473000 audit[4109]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003c6328 items=0 ppid=3920 pid=4109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:42.473000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736623865376639663534383834613638393838646635303364383962 Dec 13 02:04:42.473000 audit[4109]: AVC avc: denied { bpf } for pid=4109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:42.473000 audit[4109]: AVC avc: denied { bpf } for pid=4109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:42.473000 audit[4109]: AVC avc: denied { perfmon } for pid=4109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:42.473000 audit[4109]: AVC avc: denied { perfmon } for pid=4109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:42.473000 audit[4109]: AVC avc: denied { perfmon } for pid=4109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:42.473000 audit[4109]: AVC avc: denied { perfmon } for pid=4109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:42.473000 audit[4109]: AVC avc: denied { perfmon } for pid=4109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:42.473000 audit[4109]: AVC avc: denied { bpf } for pid=4109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:42.473000 audit[4109]: AVC avc: denied { bpf } for pid=4109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:42.473000 audit: BPF prog-id=190 op=LOAD Dec 13 02:04:42.473000 audit[4109]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003c6378 items=0 ppid=3920 pid=4109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:42.473000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736623865376639663534383834613638393838646635303364383962 Dec 13 02:04:42.474000 audit: BPF prog-id=190 op=UNLOAD Dec 13 02:04:42.474000 audit: BPF prog-id=189 op=UNLOAD Dec 13 02:04:42.474000 audit[4109]: AVC avc: denied { bpf } for pid=4109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:42.474000 audit[4109]: AVC avc: denied { bpf } for pid=4109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:42.474000 audit[4109]: AVC avc: denied { bpf } for pid=4109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:42.474000 audit[4109]: AVC avc: denied { perfmon } for pid=4109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:42.474000 audit[4109]: AVC avc: denied { perfmon } for pid=4109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:42.474000 audit[4109]: AVC avc: denied { perfmon } for pid=4109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:42.474000 audit[4109]: AVC avc: denied { perfmon } for pid=4109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:42.474000 audit[4109]: AVC avc: denied { perfmon } for pid=4109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:42.474000 audit[4109]: AVC avc: denied { bpf } for pid=4109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:42.474000 audit[4109]: AVC avc: denied { bpf } for pid=4109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:42.474000 audit: BPF prog-id=191 op=LOAD Dec 13 02:04:42.474000 audit[4109]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003c6408 items=0 ppid=3920 pid=4109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:42.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736623865376639663534383834613638393838646635303364383962 Dec 13 02:04:42.488156 env[1201]: time="2024-12-13T02:04:42.488085069Z" level=info msg="StartContainer for \"76b8e7f9f54884a68988df503d89b1cd33a912596b69c76a5e635ad7daff9a5a\" returns successfully" Dec 13 02:04:42.489804 env[1201]: time="2024-12-13T02:04:42.489760659Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 02:04:44.019297 env[1201]: time="2024-12-13T02:04:44.019238135Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:44.021836 env[1201]: time="2024-12-13T02:04:44.021812760Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:44.023361 env[1201]: time="2024-12-13T02:04:44.023327440Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:44.024849 env[1201]: time="2024-12-13T02:04:44.024817742Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:44.025260 env[1201]: time="2024-12-13T02:04:44.025238480Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 02:04:44.027001 env[1201]: time="2024-12-13T02:04:44.026974856Z" level=info msg="CreateContainer within sandbox \"9386ec7e0fbf00c0b0a7ad57fc0b8586787813f2d3884e21482519aeb8c3977e\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 02:04:44.042916 env[1201]: time="2024-12-13T02:04:44.042833435Z" level=info msg="CreateContainer within sandbox \"9386ec7e0fbf00c0b0a7ad57fc0b8586787813f2d3884e21482519aeb8c3977e\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"d8060b7b30090cb54ecb410ffa14682bc107ee201d71210a66fd3f6f0be970dc\"" Dec 13 02:04:44.043526 env[1201]: time="2024-12-13T02:04:44.043436250Z" level=info msg="StartContainer for \"d8060b7b30090cb54ecb410ffa14682bc107ee201d71210a66fd3f6f0be970dc\"" Dec 13 02:04:44.069817 systemd[1]: run-containerd-runc-k8s.io-d8060b7b30090cb54ecb410ffa14682bc107ee201d71210a66fd3f6f0be970dc-runc.WKSpYd.mount: Deactivated successfully. Dec 13 02:04:44.073534 systemd[1]: Started cri-containerd-d8060b7b30090cb54ecb410ffa14682bc107ee201d71210a66fd3f6f0be970dc.scope. Dec 13 02:04:44.087000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:44.087000 audit[4144]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fc0b29267b8 items=0 ppid=3920 pid=4144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:44.087000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438303630623762333030393063623534656362343130666661313436 Dec 13 02:04:44.088000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:44.088000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:44.088000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:44.088000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:44.088000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:44.088000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:44.088000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:44.088000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:44.088000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:44.088000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:44.088000 audit: BPF prog-id=192 op=LOAD Dec 13 02:04:44.088000 audit[4144]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003d0258 items=0 ppid=3920 pid=4144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:44.088000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438303630623762333030393063623534656362343130666661313436 Dec 13 02:04:44.089000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:44.089000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:44.089000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:44.089000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:44.089000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:44.089000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:44.089000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:44.089000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:44.089000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:44.089000 audit: BPF prog-id=193 op=LOAD Dec 13 02:04:44.089000 audit[4144]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003d02a8 items=0 ppid=3920 pid=4144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:44.089000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438303630623762333030393063623534656362343130666661313436 Dec 13 02:04:44.090000 audit: BPF prog-id=193 op=UNLOAD Dec 13 02:04:44.090000 audit: BPF prog-id=192 op=UNLOAD Dec 13 02:04:44.090000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:44.090000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:44.090000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:44.090000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:44.090000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:44.090000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:44.090000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:44.090000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:44.090000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:44.090000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:44.090000 audit: BPF prog-id=194 op=LOAD Dec 13 02:04:44.090000 audit[4144]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003d0338 items=0 ppid=3920 pid=4144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:44.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438303630623762333030393063623534656362343130666661313436 Dec 13 02:04:44.105336 env[1201]: time="2024-12-13T02:04:44.105289344Z" level=info msg="StartContainer for \"d8060b7b30090cb54ecb410ffa14682bc107ee201d71210a66fd3f6f0be970dc\" returns successfully" Dec 13 02:04:44.781219 kubelet[1930]: I1213 02:04:44.781161 1930 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 02:04:44.781219 kubelet[1930]: I1213 02:04:44.781223 1930 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 02:04:46.662000 audit[1817]: AVC avc: denied { watch } for pid=1817 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c652,c793 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:04:46.663592 kernel: kauditd_printk_skb: 124 callbacks suppressed Dec 13 02:04:46.663739 kernel: audit: type=1400 audit(1734055486.662:1310): avc: denied { watch } for pid=1817 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c652,c793 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:04:46.662000 audit[1817]: AVC avc: denied { watch } for pid=1817 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c652,c793 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:04:46.673375 kernel: audit: type=1400 audit(1734055486.662:1311): avc: denied { watch } for pid=1817 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c652,c793 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:04:46.673442 kernel: audit: type=1300 audit(1734055486.662:1310): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0019f6780 a2=fc6 a3=0 items=0 ppid=1673 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c652,c793 key=(null) Dec 13 02:04:46.662000 audit[1817]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0019f6780 a2=fc6 a3=0 items=0 ppid=1673 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c652,c793 key=(null) Dec 13 02:04:46.662000 audit[1817]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002218ed0 a2=fc6 a3=0 items=0 ppid=1673 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c652,c793 key=(null) Dec 13 02:04:46.684018 kernel: audit: type=1300 audit(1734055486.662:1311): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002218ed0 a2=fc6 a3=0 items=0 ppid=1673 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c652,c793 key=(null) Dec 13 02:04:46.684203 kernel: audit: type=1327 audit(1734055486.662:1310): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:04:46.662000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:04:46.688894 kernel: audit: type=1327 audit(1734055486.662:1311): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:04:46.662000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:04:46.703633 env[1201]: time="2024-12-13T02:04:46.703586187Z" level=info msg="StopPodSandbox for \"594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd\"" Dec 13 02:04:46.861632 kubelet[1930]: I1213 02:04:46.861554 1930 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-559bn" podStartSLOduration=36.028597868 podStartE2EDuration="42.861531558s" podCreationTimestamp="2024-12-13 02:04:04 +0000 UTC" firstStartedPulling="2024-12-13 02:04:37.192946232 +0000 UTC m=+47.565152524" lastFinishedPulling="2024-12-13 02:04:44.025879922 +0000 UTC m=+54.398086214" observedRunningTime="2024-12-13 02:04:44.90582996 +0000 UTC m=+55.278036262" watchObservedRunningTime="2024-12-13 02:04:46.861531558 +0000 UTC m=+57.233737850" Dec 13 02:04:46.890701 env[1201]: 2024-12-13 02:04:46.862 [INFO][4196] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd" Dec 13 02:04:46.890701 env[1201]: 2024-12-13 02:04:46.862 [INFO][4196] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd" iface="eth0" netns="/var/run/netns/cni-4557e35d-9d29-fa06-526a-c3cf6cbc3ebb" Dec 13 02:04:46.890701 env[1201]: 2024-12-13 02:04:46.862 [INFO][4196] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd" iface="eth0" netns="/var/run/netns/cni-4557e35d-9d29-fa06-526a-c3cf6cbc3ebb" Dec 13 02:04:46.890701 env[1201]: 2024-12-13 02:04:46.862 [INFO][4196] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd" iface="eth0" netns="/var/run/netns/cni-4557e35d-9d29-fa06-526a-c3cf6cbc3ebb" Dec 13 02:04:46.890701 env[1201]: 2024-12-13 02:04:46.862 [INFO][4196] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd" Dec 13 02:04:46.890701 env[1201]: 2024-12-13 02:04:46.862 [INFO][4196] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd" Dec 13 02:04:46.890701 env[1201]: 2024-12-13 02:04:46.880 [INFO][4203] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd" HandleID="k8s-pod-network.594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd" Workload="localhost-k8s-coredns--6f6b679f8f--wgzqb-eth0" Dec 13 02:04:46.890701 env[1201]: 2024-12-13 02:04:46.880 [INFO][4203] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:04:46.890701 env[1201]: 2024-12-13 02:04:46.880 [INFO][4203] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:04:46.890701 env[1201]: 2024-12-13 02:04:46.886 [WARNING][4203] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd" HandleID="k8s-pod-network.594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd" Workload="localhost-k8s-coredns--6f6b679f8f--wgzqb-eth0" Dec 13 02:04:46.890701 env[1201]: 2024-12-13 02:04:46.886 [INFO][4203] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd" HandleID="k8s-pod-network.594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd" Workload="localhost-k8s-coredns--6f6b679f8f--wgzqb-eth0" Dec 13 02:04:46.890701 env[1201]: 2024-12-13 02:04:46.887 [INFO][4203] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:04:46.890701 env[1201]: 2024-12-13 02:04:46.889 [INFO][4196] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd" Dec 13 02:04:46.891165 env[1201]: time="2024-12-13T02:04:46.890883494Z" level=info msg="TearDown network for sandbox \"594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd\" successfully" Dec 13 02:04:46.891165 env[1201]: time="2024-12-13T02:04:46.890923151Z" level=info msg="StopPodSandbox for \"594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd\" returns successfully" Dec 13 02:04:46.891294 kubelet[1930]: E1213 02:04:46.891255 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:04:46.891990 env[1201]: time="2024-12-13T02:04:46.891943597Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-wgzqb,Uid:f1443aa5-1d21-4afb-99f6-5788e787fa3a,Namespace:kube-system,Attempt:1,}" Dec 13 02:04:46.896914 systemd[1]: run-netns-cni\x2d4557e35d\x2d9d29\x2dfa06\x2d526a\x2dc3cf6cbc3ebb.mount: Deactivated successfully. Dec 13 02:04:47.015000 audit[1782]: AVC avc: denied { watch } for pid=1782 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c238 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:04:47.015000 audit[1782]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c00856cf30 a2=fc6 a3=0 items=0 ppid=1638 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c238 key=(null) Dec 13 02:04:47.026874 kernel: audit: type=1400 audit(1734055487.015:1312): avc: denied { watch } for pid=1782 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c238 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:04:47.026919 kernel: audit: type=1300 audit(1734055487.015:1312): arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c00856cf30 a2=fc6 a3=0 items=0 ppid=1638 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c238 key=(null) Dec 13 02:04:47.015000 audit[1782]: AVC avc: denied { watch } for pid=1782 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c238 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:04:47.030964 kernel: audit: type=1400 audit(1734055487.015:1314): avc: denied { watch } for pid=1782 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c238 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:04:47.031018 kernel: audit: type=1400 audit(1734055487.015:1313): avc: denied { watch } for pid=1782 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c238 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:04:47.015000 audit[1782]: AVC avc: denied { watch } for pid=1782 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c238 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:04:47.015000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3935002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 02:04:47.015000 audit[1782]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c00dcb2680 a2=fc6 a3=0 items=0 ppid=1638 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c238 key=(null) Dec 13 02:04:47.015000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3935002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 02:04:47.015000 audit[1782]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c008182ea0 a2=fc6 a3=0 items=0 ppid=1638 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c238 key=(null) Dec 13 02:04:47.015000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3935002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 02:04:47.017000 audit[1782]: AVC avc: denied { watch } for pid=1782 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c238 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:04:47.017000 audit[1782]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c00da4b280 a2=fc6 a3=0 items=0 ppid=1638 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c238 key=(null) Dec 13 02:04:47.017000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3935002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 02:04:47.018000 audit[1782]: AVC avc: denied { watch } for pid=1782 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c238 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:04:47.018000 audit[1782]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00856d140 a2=fc6 a3=0 items=0 ppid=1638 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c238 key=(null) Dec 13 02:04:47.018000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3935002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 02:04:47.018000 audit[1782]: AVC avc: denied { watch } for pid=1782 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c238 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:04:47.018000 audit[1782]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00856d350 a2=fc6 a3=0 items=0 ppid=1638 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c238 key=(null) Dec 13 02:04:47.018000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3935002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 02:04:47.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.95:22-10.0.0.1:40578 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:47.065541 systemd[1]: Started sshd@13-10.0.0.95:22-10.0.0.1:40578.service. Dec 13 02:04:47.105000 audit[4211]: USER_ACCT pid=4211 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:47.107365 sshd[4211]: Accepted publickey for core from 10.0.0.1 port 40578 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:04:47.106000 audit[4211]: CRED_ACQ pid=4211 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:47.106000 audit[4211]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd96974860 a2=3 a3=0 items=0 ppid=1 pid=4211 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:47.106000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:04:47.108496 sshd[4211]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:04:47.112070 systemd-logind[1186]: New session 14 of user core. Dec 13 02:04:47.113009 systemd[1]: Started session-14.scope. Dec 13 02:04:47.116000 audit[4211]: USER_START pid=4211 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:47.117000 audit[4213]: CRED_ACQ pid=4213 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:47.312023 sshd[4211]: pam_unix(sshd:session): session closed for user core Dec 13 02:04:47.311000 audit[4211]: USER_END pid=4211 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:47.312000 audit[4211]: CRED_DISP pid=4211 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:47.314563 systemd[1]: sshd@13-10.0.0.95:22-10.0.0.1:40578.service: Deactivated successfully. Dec 13 02:04:47.313000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.95:22-10.0.0.1:40578 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:47.315576 systemd[1]: session-14.scope: Deactivated successfully. Dec 13 02:04:47.316241 systemd-logind[1186]: Session 14 logged out. Waiting for processes to exit. Dec 13 02:04:47.317097 systemd-logind[1186]: Removed session 14. Dec 13 02:04:47.357287 systemd-networkd[1025]: calia477857f151: Link UP Dec 13 02:04:47.357867 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:04:47.357900 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia477857f151: link becomes ready Dec 13 02:04:47.358502 systemd-networkd[1025]: calia477857f151: Gained carrier Dec 13 02:04:47.510454 env[1201]: 2024-12-13 02:04:47.225 [INFO][4223] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--6f6b679f8f--wgzqb-eth0 coredns-6f6b679f8f- kube-system f1443aa5-1d21-4afb-99f6-5788e787fa3a 1020 0 2024-12-13 02:03:55 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-6f6b679f8f-wgzqb eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calia477857f151 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="5cf63d9809f6362d82738e20893fd23387054c678db077b467ef453dd0cf27d4" Namespace="kube-system" Pod="coredns-6f6b679f8f-wgzqb" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--wgzqb-" Dec 13 02:04:47.510454 env[1201]: 2024-12-13 02:04:47.225 [INFO][4223] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="5cf63d9809f6362d82738e20893fd23387054c678db077b467ef453dd0cf27d4" Namespace="kube-system" Pod="coredns-6f6b679f8f-wgzqb" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--wgzqb-eth0" Dec 13 02:04:47.510454 env[1201]: 2024-12-13 02:04:47.254 [INFO][4237] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5cf63d9809f6362d82738e20893fd23387054c678db077b467ef453dd0cf27d4" HandleID="k8s-pod-network.5cf63d9809f6362d82738e20893fd23387054c678db077b467ef453dd0cf27d4" Workload="localhost-k8s-coredns--6f6b679f8f--wgzqb-eth0" Dec 13 02:04:47.510454 env[1201]: 2024-12-13 02:04:47.264 [INFO][4237] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="5cf63d9809f6362d82738e20893fd23387054c678db077b467ef453dd0cf27d4" HandleID="k8s-pod-network.5cf63d9809f6362d82738e20893fd23387054c678db077b467ef453dd0cf27d4" Workload="localhost-k8s-coredns--6f6b679f8f--wgzqb-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002dd310), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-6f6b679f8f-wgzqb", "timestamp":"2024-12-13 02:04:47.254758664 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:04:47.510454 env[1201]: 2024-12-13 02:04:47.264 [INFO][4237] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:04:47.510454 env[1201]: 2024-12-13 02:04:47.264 [INFO][4237] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:04:47.510454 env[1201]: 2024-12-13 02:04:47.264 [INFO][4237] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 02:04:47.510454 env[1201]: 2024-12-13 02:04:47.266 [INFO][4237] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5cf63d9809f6362d82738e20893fd23387054c678db077b467ef453dd0cf27d4" host="localhost" Dec 13 02:04:47.510454 env[1201]: 2024-12-13 02:04:47.271 [INFO][4237] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 02:04:47.510454 env[1201]: 2024-12-13 02:04:47.275 [INFO][4237] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 02:04:47.510454 env[1201]: 2024-12-13 02:04:47.276 [INFO][4237] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 02:04:47.510454 env[1201]: 2024-12-13 02:04:47.278 [INFO][4237] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 02:04:47.510454 env[1201]: 2024-12-13 02:04:47.278 [INFO][4237] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.5cf63d9809f6362d82738e20893fd23387054c678db077b467ef453dd0cf27d4" host="localhost" Dec 13 02:04:47.510454 env[1201]: 2024-12-13 02:04:47.279 [INFO][4237] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.5cf63d9809f6362d82738e20893fd23387054c678db077b467ef453dd0cf27d4 Dec 13 02:04:47.510454 env[1201]: 2024-12-13 02:04:47.306 [INFO][4237] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.5cf63d9809f6362d82738e20893fd23387054c678db077b467ef453dd0cf27d4" host="localhost" Dec 13 02:04:47.510454 env[1201]: 2024-12-13 02:04:47.350 [INFO][4237] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.5cf63d9809f6362d82738e20893fd23387054c678db077b467ef453dd0cf27d4" host="localhost" Dec 13 02:04:47.510454 env[1201]: 2024-12-13 02:04:47.350 [INFO][4237] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.5cf63d9809f6362d82738e20893fd23387054c678db077b467ef453dd0cf27d4" host="localhost" Dec 13 02:04:47.510454 env[1201]: 2024-12-13 02:04:47.350 [INFO][4237] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:04:47.510454 env[1201]: 2024-12-13 02:04:47.350 [INFO][4237] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="5cf63d9809f6362d82738e20893fd23387054c678db077b467ef453dd0cf27d4" HandleID="k8s-pod-network.5cf63d9809f6362d82738e20893fd23387054c678db077b467ef453dd0cf27d4" Workload="localhost-k8s-coredns--6f6b679f8f--wgzqb-eth0" Dec 13 02:04:47.511063 env[1201]: 2024-12-13 02:04:47.352 [INFO][4223] cni-plugin/k8s.go 386: Populated endpoint ContainerID="5cf63d9809f6362d82738e20893fd23387054c678db077b467ef453dd0cf27d4" Namespace="kube-system" Pod="coredns-6f6b679f8f-wgzqb" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--wgzqb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--wgzqb-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"f1443aa5-1d21-4afb-99f6-5788e787fa3a", ResourceVersion:"1020", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 3, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-6f6b679f8f-wgzqb", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia477857f151", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:04:47.511063 env[1201]: 2024-12-13 02:04:47.353 [INFO][4223] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="5cf63d9809f6362d82738e20893fd23387054c678db077b467ef453dd0cf27d4" Namespace="kube-system" Pod="coredns-6f6b679f8f-wgzqb" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--wgzqb-eth0" Dec 13 02:04:47.511063 env[1201]: 2024-12-13 02:04:47.353 [INFO][4223] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calia477857f151 ContainerID="5cf63d9809f6362d82738e20893fd23387054c678db077b467ef453dd0cf27d4" Namespace="kube-system" Pod="coredns-6f6b679f8f-wgzqb" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--wgzqb-eth0" Dec 13 02:04:47.511063 env[1201]: 2024-12-13 02:04:47.357 [INFO][4223] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="5cf63d9809f6362d82738e20893fd23387054c678db077b467ef453dd0cf27d4" Namespace="kube-system" Pod="coredns-6f6b679f8f-wgzqb" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--wgzqb-eth0" Dec 13 02:04:47.511063 env[1201]: 2024-12-13 02:04:47.358 [INFO][4223] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="5cf63d9809f6362d82738e20893fd23387054c678db077b467ef453dd0cf27d4" Namespace="kube-system" Pod="coredns-6f6b679f8f-wgzqb" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--wgzqb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--wgzqb-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"f1443aa5-1d21-4afb-99f6-5788e787fa3a", ResourceVersion:"1020", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 3, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"5cf63d9809f6362d82738e20893fd23387054c678db077b467ef453dd0cf27d4", Pod:"coredns-6f6b679f8f-wgzqb", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia477857f151", MAC:"22:8d:1a:49:9b:1f", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:04:47.511063 env[1201]: 2024-12-13 02:04:47.508 [INFO][4223] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="5cf63d9809f6362d82738e20893fd23387054c678db077b467ef453dd0cf27d4" Namespace="kube-system" Pod="coredns-6f6b679f8f-wgzqb" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--wgzqb-eth0" Dec 13 02:04:47.517000 audit[4262]: NETFILTER_CFG table=filter:110 family=2 entries=42 op=nft_register_chain pid=4262 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:04:47.517000 audit[4262]: SYSCALL arch=c000003e syscall=46 success=yes exit=20596 a0=3 a1=7ffe76f60c50 a2=0 a3=7ffe76f60c3c items=0 ppid=3639 pid=4262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:47.517000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:04:47.585635 env[1201]: time="2024-12-13T02:04:47.585504675Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:04:47.585772 env[1201]: time="2024-12-13T02:04:47.585555966Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:04:47.585772 env[1201]: time="2024-12-13T02:04:47.585566667Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:04:47.585772 env[1201]: time="2024-12-13T02:04:47.585694288Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5cf63d9809f6362d82738e20893fd23387054c678db077b467ef453dd0cf27d4 pid=4270 runtime=io.containerd.runc.v2 Dec 13 02:04:47.604156 systemd[1]: Started cri-containerd-5cf63d9809f6362d82738e20893fd23387054c678db077b467ef453dd0cf27d4.scope. Dec 13 02:04:47.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:47.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:47.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:47.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:47.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:47.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:47.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:47.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:47.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:47.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:47.612000 audit: BPF prog-id=195 op=LOAD Dec 13 02:04:47.612000 audit[4280]: AVC avc: denied { bpf } for pid=4280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:47.612000 audit[4280]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4270 pid=4280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:47.612000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563663633643938303966363336326438323733386532303839336664 Dec 13 02:04:47.613000 audit[4280]: AVC avc: denied { perfmon } for pid=4280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:47.613000 audit[4280]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4270 pid=4280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:47.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563663633643938303966363336326438323733386532303839336664 Dec 13 02:04:47.613000 audit[4280]: AVC avc: denied { bpf } for pid=4280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:47.613000 audit[4280]: AVC avc: denied { bpf } for pid=4280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:47.613000 audit[4280]: AVC avc: denied { bpf } for pid=4280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:47.613000 audit[4280]: AVC avc: denied { perfmon } for pid=4280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:47.613000 audit[4280]: AVC avc: denied { perfmon } for pid=4280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:47.613000 audit[4280]: AVC avc: denied { perfmon } for pid=4280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:47.613000 audit[4280]: AVC avc: denied { perfmon } for pid=4280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:47.613000 audit[4280]: AVC avc: denied { perfmon } for pid=4280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:47.613000 audit[4280]: AVC avc: denied { bpf } for pid=4280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:47.613000 audit[4280]: AVC avc: denied { bpf } for pid=4280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:47.613000 audit: BPF prog-id=196 op=LOAD Dec 13 02:04:47.613000 audit[4280]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003ea000 items=0 ppid=4270 pid=4280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:47.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563663633643938303966363336326438323733386532303839336664 Dec 13 02:04:47.613000 audit[4280]: AVC avc: denied { bpf } for pid=4280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:47.613000 audit[4280]: AVC avc: denied { bpf } for pid=4280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:47.613000 audit[4280]: AVC avc: denied { perfmon } for pid=4280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:47.613000 audit[4280]: AVC avc: denied { perfmon } for pid=4280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:47.613000 audit[4280]: AVC avc: denied { perfmon } for pid=4280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:47.613000 audit[4280]: AVC avc: denied { perfmon } for pid=4280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:47.613000 audit[4280]: AVC avc: denied { perfmon } for pid=4280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:47.613000 audit[4280]: AVC avc: denied { bpf } for pid=4280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:47.613000 audit[4280]: AVC avc: denied { bpf } for pid=4280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:47.613000 audit: BPF prog-id=197 op=LOAD Dec 13 02:04:47.613000 audit[4280]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003ea048 items=0 ppid=4270 pid=4280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:47.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563663633643938303966363336326438323733386532303839336664 Dec 13 02:04:47.613000 audit: BPF prog-id=197 op=UNLOAD Dec 13 02:04:47.613000 audit: BPF prog-id=196 op=UNLOAD Dec 13 02:04:47.613000 audit[4280]: AVC avc: denied { bpf } for pid=4280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:47.613000 audit[4280]: AVC avc: denied { bpf } for pid=4280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:47.613000 audit[4280]: AVC avc: denied { bpf } for pid=4280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:47.613000 audit[4280]: AVC avc: denied { perfmon } for pid=4280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:47.613000 audit[4280]: AVC avc: denied { perfmon } for pid=4280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:47.613000 audit[4280]: AVC avc: denied { perfmon } for pid=4280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:47.613000 audit[4280]: AVC avc: denied { perfmon } for pid=4280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:47.613000 audit[4280]: AVC avc: denied { perfmon } for pid=4280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:47.613000 audit[4280]: AVC avc: denied { bpf } for pid=4280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:47.613000 audit[4280]: AVC avc: denied { bpf } for pid=4280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:47.613000 audit: BPF prog-id=198 op=LOAD Dec 13 02:04:47.613000 audit[4280]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003ea458 items=0 ppid=4270 pid=4280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:47.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563663633643938303966363336326438323733386532303839336664 Dec 13 02:04:47.615278 systemd-resolved[1139]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 02:04:47.637478 env[1201]: time="2024-12-13T02:04:47.637434480Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-wgzqb,Uid:f1443aa5-1d21-4afb-99f6-5788e787fa3a,Namespace:kube-system,Attempt:1,} returns sandbox id \"5cf63d9809f6362d82738e20893fd23387054c678db077b467ef453dd0cf27d4\"" Dec 13 02:04:47.638215 kubelet[1930]: E1213 02:04:47.638157 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:04:47.640301 env[1201]: time="2024-12-13T02:04:47.640269631Z" level=info msg="CreateContainer within sandbox \"5cf63d9809f6362d82738e20893fd23387054c678db077b467ef453dd0cf27d4\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 02:04:48.246826 env[1201]: time="2024-12-13T02:04:48.246739526Z" level=info msg="CreateContainer within sandbox \"5cf63d9809f6362d82738e20893fd23387054c678db077b467ef453dd0cf27d4\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"7dfca0cff7982ef20b4e875bba12eaa7feda6c177046dab22e6ba8c0b67249f8\"" Dec 13 02:04:48.247729 env[1201]: time="2024-12-13T02:04:48.247686385Z" level=info msg="StartContainer for \"7dfca0cff7982ef20b4e875bba12eaa7feda6c177046dab22e6ba8c0b67249f8\"" Dec 13 02:04:48.271094 systemd[1]: run-containerd-runc-k8s.io-7dfca0cff7982ef20b4e875bba12eaa7feda6c177046dab22e6ba8c0b67249f8-runc.fDJUHN.mount: Deactivated successfully. Dec 13 02:04:48.272844 systemd[1]: Started cri-containerd-7dfca0cff7982ef20b4e875bba12eaa7feda6c177046dab22e6ba8c0b67249f8.scope. Dec 13 02:04:48.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.283000 audit: BPF prog-id=199 op=LOAD Dec 13 02:04:48.283000 audit[4309]: AVC avc: denied { bpf } for pid=4309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.283000 audit[4309]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4270 pid=4309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:48.283000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764666361306366663739383265663230623465383735626261313265 Dec 13 02:04:48.283000 audit[4309]: AVC avc: denied { perfmon } for pid=4309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.283000 audit[4309]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4270 pid=4309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:48.283000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764666361306366663739383265663230623465383735626261313265 Dec 13 02:04:48.283000 audit[4309]: AVC avc: denied { bpf } for pid=4309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.283000 audit[4309]: AVC avc: denied { bpf } for pid=4309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.283000 audit[4309]: AVC avc: denied { bpf } for pid=4309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.283000 audit[4309]: AVC avc: denied { perfmon } for pid=4309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.283000 audit[4309]: AVC avc: denied { perfmon } for pid=4309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.283000 audit[4309]: AVC avc: denied { perfmon } for pid=4309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.283000 audit[4309]: AVC avc: denied { perfmon } for pid=4309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.283000 audit[4309]: AVC avc: denied { perfmon } for pid=4309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.283000 audit[4309]: AVC avc: denied { bpf } for pid=4309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.283000 audit[4309]: AVC avc: denied { bpf } for pid=4309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.283000 audit: BPF prog-id=200 op=LOAD Dec 13 02:04:48.283000 audit[4309]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00032a050 items=0 ppid=4270 pid=4309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:48.283000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764666361306366663739383265663230623465383735626261313265 Dec 13 02:04:48.283000 audit[4309]: AVC avc: denied { bpf } for pid=4309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.283000 audit[4309]: AVC avc: denied { bpf } for pid=4309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.283000 audit[4309]: AVC avc: denied { perfmon } for pid=4309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.283000 audit[4309]: AVC avc: denied { perfmon } for pid=4309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.283000 audit[4309]: AVC avc: denied { perfmon } for pid=4309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.283000 audit[4309]: AVC avc: denied { perfmon } for pid=4309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.283000 audit[4309]: AVC avc: denied { perfmon } for pid=4309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.283000 audit[4309]: AVC avc: denied { bpf } for pid=4309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.283000 audit[4309]: AVC avc: denied { bpf } for pid=4309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.283000 audit: BPF prog-id=201 op=LOAD Dec 13 02:04:48.283000 audit[4309]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00032a098 items=0 ppid=4270 pid=4309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:48.283000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764666361306366663739383265663230623465383735626261313265 Dec 13 02:04:48.284000 audit: BPF prog-id=201 op=UNLOAD Dec 13 02:04:48.284000 audit: BPF prog-id=200 op=UNLOAD Dec 13 02:04:48.284000 audit[4309]: AVC avc: denied { bpf } for pid=4309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.284000 audit[4309]: AVC avc: denied { bpf } for pid=4309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.284000 audit[4309]: AVC avc: denied { bpf } for pid=4309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.284000 audit[4309]: AVC avc: denied { perfmon } for pid=4309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.284000 audit[4309]: AVC avc: denied { perfmon } for pid=4309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.284000 audit[4309]: AVC avc: denied { perfmon } for pid=4309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.284000 audit[4309]: AVC avc: denied { perfmon } for pid=4309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.284000 audit[4309]: AVC avc: denied { perfmon } for pid=4309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.284000 audit[4309]: AVC avc: denied { bpf } for pid=4309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.284000 audit[4309]: AVC avc: denied { bpf } for pid=4309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.284000 audit: BPF prog-id=202 op=LOAD Dec 13 02:04:48.284000 audit[4309]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00032a4a8 items=0 ppid=4270 pid=4309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:48.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764666361306366663739383265663230623465383735626261313265 Dec 13 02:04:48.365789 env[1201]: time="2024-12-13T02:04:48.365719740Z" level=info msg="StartContainer for \"7dfca0cff7982ef20b4e875bba12eaa7feda6c177046dab22e6ba8c0b67249f8\" returns successfully" Dec 13 02:04:48.703793 env[1201]: time="2024-12-13T02:04:48.703718643Z" level=info msg="StopPodSandbox for \"a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8\"" Dec 13 02:04:48.770505 env[1201]: 2024-12-13 02:04:48.740 [INFO][4357] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8" Dec 13 02:04:48.770505 env[1201]: 2024-12-13 02:04:48.740 [INFO][4357] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8" iface="eth0" netns="/var/run/netns/cni-dfcac1cd-98cd-b7f5-b550-56693c5244c1" Dec 13 02:04:48.770505 env[1201]: 2024-12-13 02:04:48.740 [INFO][4357] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8" iface="eth0" netns="/var/run/netns/cni-dfcac1cd-98cd-b7f5-b550-56693c5244c1" Dec 13 02:04:48.770505 env[1201]: 2024-12-13 02:04:48.742 [INFO][4357] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8" iface="eth0" netns="/var/run/netns/cni-dfcac1cd-98cd-b7f5-b550-56693c5244c1" Dec 13 02:04:48.770505 env[1201]: 2024-12-13 02:04:48.742 [INFO][4357] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8" Dec 13 02:04:48.770505 env[1201]: 2024-12-13 02:04:48.742 [INFO][4357] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8" Dec 13 02:04:48.770505 env[1201]: 2024-12-13 02:04:48.761 [INFO][4364] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8" HandleID="k8s-pod-network.a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8" Workload="localhost-k8s-calico--apiserver--844858f88f--xpmjh-eth0" Dec 13 02:04:48.770505 env[1201]: 2024-12-13 02:04:48.761 [INFO][4364] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:04:48.770505 env[1201]: 2024-12-13 02:04:48.761 [INFO][4364] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:04:48.770505 env[1201]: 2024-12-13 02:04:48.766 [WARNING][4364] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8" HandleID="k8s-pod-network.a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8" Workload="localhost-k8s-calico--apiserver--844858f88f--xpmjh-eth0" Dec 13 02:04:48.770505 env[1201]: 2024-12-13 02:04:48.766 [INFO][4364] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8" HandleID="k8s-pod-network.a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8" Workload="localhost-k8s-calico--apiserver--844858f88f--xpmjh-eth0" Dec 13 02:04:48.770505 env[1201]: 2024-12-13 02:04:48.767 [INFO][4364] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:04:48.770505 env[1201]: 2024-12-13 02:04:48.769 [INFO][4357] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8" Dec 13 02:04:48.771076 env[1201]: time="2024-12-13T02:04:48.770704543Z" level=info msg="TearDown network for sandbox \"a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8\" successfully" Dec 13 02:04:48.771076 env[1201]: time="2024-12-13T02:04:48.770737788Z" level=info msg="StopPodSandbox for \"a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8\" returns successfully" Dec 13 02:04:48.771394 env[1201]: time="2024-12-13T02:04:48.771368588Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-844858f88f-xpmjh,Uid:f86c03bf-e3cf-46e2-8f7c-974a2bb1f8e6,Namespace:calico-apiserver,Attempt:1,}" Dec 13 02:04:48.866837 systemd-networkd[1025]: cali32625e8413b: Link UP Dec 13 02:04:48.869557 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:04:48.869598 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali32625e8413b: link becomes ready Dec 13 02:04:48.869687 systemd-networkd[1025]: cali32625e8413b: Gained carrier Dec 13 02:04:48.883683 env[1201]: 2024-12-13 02:04:48.808 [INFO][4372] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--844858f88f--xpmjh-eth0 calico-apiserver-844858f88f- calico-apiserver f86c03bf-e3cf-46e2-8f7c-974a2bb1f8e6 1038 0 2024-12-13 02:04:04 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:844858f88f projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-844858f88f-xpmjh eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali32625e8413b [] []}} ContainerID="d7456c2d40d9ec9cd2dfb9a8ea607b1cdcbcdf22a5587eb59d29cb128deec27f" Namespace="calico-apiserver" Pod="calico-apiserver-844858f88f-xpmjh" WorkloadEndpoint="localhost-k8s-calico--apiserver--844858f88f--xpmjh-" Dec 13 02:04:48.883683 env[1201]: 2024-12-13 02:04:48.808 [INFO][4372] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="d7456c2d40d9ec9cd2dfb9a8ea607b1cdcbcdf22a5587eb59d29cb128deec27f" Namespace="calico-apiserver" Pod="calico-apiserver-844858f88f-xpmjh" WorkloadEndpoint="localhost-k8s-calico--apiserver--844858f88f--xpmjh-eth0" Dec 13 02:04:48.883683 env[1201]: 2024-12-13 02:04:48.833 [INFO][4385] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d7456c2d40d9ec9cd2dfb9a8ea607b1cdcbcdf22a5587eb59d29cb128deec27f" HandleID="k8s-pod-network.d7456c2d40d9ec9cd2dfb9a8ea607b1cdcbcdf22a5587eb59d29cb128deec27f" Workload="localhost-k8s-calico--apiserver--844858f88f--xpmjh-eth0" Dec 13 02:04:48.883683 env[1201]: 2024-12-13 02:04:48.840 [INFO][4385] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d7456c2d40d9ec9cd2dfb9a8ea607b1cdcbcdf22a5587eb59d29cb128deec27f" HandleID="k8s-pod-network.d7456c2d40d9ec9cd2dfb9a8ea607b1cdcbcdf22a5587eb59d29cb128deec27f" Workload="localhost-k8s-calico--apiserver--844858f88f--xpmjh-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00030f560), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-844858f88f-xpmjh", "timestamp":"2024-12-13 02:04:48.833165665 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:04:48.883683 env[1201]: 2024-12-13 02:04:48.840 [INFO][4385] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:04:48.883683 env[1201]: 2024-12-13 02:04:48.840 [INFO][4385] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:04:48.883683 env[1201]: 2024-12-13 02:04:48.840 [INFO][4385] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 02:04:48.883683 env[1201]: 2024-12-13 02:04:48.842 [INFO][4385] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d7456c2d40d9ec9cd2dfb9a8ea607b1cdcbcdf22a5587eb59d29cb128deec27f" host="localhost" Dec 13 02:04:48.883683 env[1201]: 2024-12-13 02:04:48.845 [INFO][4385] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 02:04:48.883683 env[1201]: 2024-12-13 02:04:48.848 [INFO][4385] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 02:04:48.883683 env[1201]: 2024-12-13 02:04:48.850 [INFO][4385] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 02:04:48.883683 env[1201]: 2024-12-13 02:04:48.852 [INFO][4385] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 02:04:48.883683 env[1201]: 2024-12-13 02:04:48.852 [INFO][4385] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.d7456c2d40d9ec9cd2dfb9a8ea607b1cdcbcdf22a5587eb59d29cb128deec27f" host="localhost" Dec 13 02:04:48.883683 env[1201]: 2024-12-13 02:04:48.853 [INFO][4385] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.d7456c2d40d9ec9cd2dfb9a8ea607b1cdcbcdf22a5587eb59d29cb128deec27f Dec 13 02:04:48.883683 env[1201]: 2024-12-13 02:04:48.856 [INFO][4385] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.d7456c2d40d9ec9cd2dfb9a8ea607b1cdcbcdf22a5587eb59d29cb128deec27f" host="localhost" Dec 13 02:04:48.883683 env[1201]: 2024-12-13 02:04:48.862 [INFO][4385] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.d7456c2d40d9ec9cd2dfb9a8ea607b1cdcbcdf22a5587eb59d29cb128deec27f" host="localhost" Dec 13 02:04:48.883683 env[1201]: 2024-12-13 02:04:48.862 [INFO][4385] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.d7456c2d40d9ec9cd2dfb9a8ea607b1cdcbcdf22a5587eb59d29cb128deec27f" host="localhost" Dec 13 02:04:48.883683 env[1201]: 2024-12-13 02:04:48.862 [INFO][4385] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:04:48.883683 env[1201]: 2024-12-13 02:04:48.862 [INFO][4385] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="d7456c2d40d9ec9cd2dfb9a8ea607b1cdcbcdf22a5587eb59d29cb128deec27f" HandleID="k8s-pod-network.d7456c2d40d9ec9cd2dfb9a8ea607b1cdcbcdf22a5587eb59d29cb128deec27f" Workload="localhost-k8s-calico--apiserver--844858f88f--xpmjh-eth0" Dec 13 02:04:48.884318 env[1201]: 2024-12-13 02:04:48.864 [INFO][4372] cni-plugin/k8s.go 386: Populated endpoint ContainerID="d7456c2d40d9ec9cd2dfb9a8ea607b1cdcbcdf22a5587eb59d29cb128deec27f" Namespace="calico-apiserver" Pod="calico-apiserver-844858f88f-xpmjh" WorkloadEndpoint="localhost-k8s-calico--apiserver--844858f88f--xpmjh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--844858f88f--xpmjh-eth0", GenerateName:"calico-apiserver-844858f88f-", Namespace:"calico-apiserver", SelfLink:"", UID:"f86c03bf-e3cf-46e2-8f7c-974a2bb1f8e6", ResourceVersion:"1038", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 4, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"844858f88f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-844858f88f-xpmjh", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali32625e8413b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:04:48.884318 env[1201]: 2024-12-13 02:04:48.865 [INFO][4372] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.134/32] ContainerID="d7456c2d40d9ec9cd2dfb9a8ea607b1cdcbcdf22a5587eb59d29cb128deec27f" Namespace="calico-apiserver" Pod="calico-apiserver-844858f88f-xpmjh" WorkloadEndpoint="localhost-k8s-calico--apiserver--844858f88f--xpmjh-eth0" Dec 13 02:04:48.884318 env[1201]: 2024-12-13 02:04:48.865 [INFO][4372] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali32625e8413b ContainerID="d7456c2d40d9ec9cd2dfb9a8ea607b1cdcbcdf22a5587eb59d29cb128deec27f" Namespace="calico-apiserver" Pod="calico-apiserver-844858f88f-xpmjh" WorkloadEndpoint="localhost-k8s-calico--apiserver--844858f88f--xpmjh-eth0" Dec 13 02:04:48.884318 env[1201]: 2024-12-13 02:04:48.870 [INFO][4372] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d7456c2d40d9ec9cd2dfb9a8ea607b1cdcbcdf22a5587eb59d29cb128deec27f" Namespace="calico-apiserver" Pod="calico-apiserver-844858f88f-xpmjh" WorkloadEndpoint="localhost-k8s-calico--apiserver--844858f88f--xpmjh-eth0" Dec 13 02:04:48.884318 env[1201]: 2024-12-13 02:04:48.870 [INFO][4372] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="d7456c2d40d9ec9cd2dfb9a8ea607b1cdcbcdf22a5587eb59d29cb128deec27f" Namespace="calico-apiserver" Pod="calico-apiserver-844858f88f-xpmjh" WorkloadEndpoint="localhost-k8s-calico--apiserver--844858f88f--xpmjh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--844858f88f--xpmjh-eth0", GenerateName:"calico-apiserver-844858f88f-", Namespace:"calico-apiserver", SelfLink:"", UID:"f86c03bf-e3cf-46e2-8f7c-974a2bb1f8e6", ResourceVersion:"1038", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 4, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"844858f88f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"d7456c2d40d9ec9cd2dfb9a8ea607b1cdcbcdf22a5587eb59d29cb128deec27f", Pod:"calico-apiserver-844858f88f-xpmjh", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali32625e8413b", MAC:"22:b9:ad:ce:40:69", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:04:48.884318 env[1201]: 2024-12-13 02:04:48.880 [INFO][4372] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="d7456c2d40d9ec9cd2dfb9a8ea607b1cdcbcdf22a5587eb59d29cb128deec27f" Namespace="calico-apiserver" Pod="calico-apiserver-844858f88f-xpmjh" WorkloadEndpoint="localhost-k8s-calico--apiserver--844858f88f--xpmjh-eth0" Dec 13 02:04:48.891000 audit[4405]: NETFILTER_CFG table=filter:111 family=2 entries=56 op=nft_register_chain pid=4405 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:04:48.891000 audit[4405]: SYSCALL arch=c000003e syscall=46 success=yes exit=27932 a0=3 a1=7ffc82ed4b40 a2=0 a3=7ffc82ed4b2c items=0 ppid=3639 pid=4405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:48.891000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:04:48.901503 systemd[1]: run-netns-cni\x2ddfcac1cd\x2d98cd\x2db7f5\x2db550\x2d56693c5244c1.mount: Deactivated successfully. Dec 13 02:04:48.904523 env[1201]: time="2024-12-13T02:04:48.898704412Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:04:48.904523 env[1201]: time="2024-12-13T02:04:48.898741214Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:04:48.904523 env[1201]: time="2024-12-13T02:04:48.898750602Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:04:48.904523 env[1201]: time="2024-12-13T02:04:48.898917848Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d7456c2d40d9ec9cd2dfb9a8ea607b1cdcbcdf22a5587eb59d29cb128deec27f pid=4413 runtime=io.containerd.runc.v2 Dec 13 02:04:48.912268 kubelet[1930]: E1213 02:04:48.912172 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:04:48.924994 systemd[1]: Started cri-containerd-d7456c2d40d9ec9cd2dfb9a8ea607b1cdcbcdf22a5587eb59d29cb128deec27f.scope. Dec 13 02:04:48.944278 kubelet[1930]: I1213 02:04:48.943698 1930 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-wgzqb" podStartSLOduration=53.943680433 podStartE2EDuration="53.943680433s" podCreationTimestamp="2024-12-13 02:03:55 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:04:48.927739865 +0000 UTC m=+59.299946157" watchObservedRunningTime="2024-12-13 02:04:48.943680433 +0000 UTC m=+59.315886725" Dec 13 02:04:48.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.944000 audit: BPF prog-id=203 op=LOAD Dec 13 02:04:48.944000 audit[4444]: NETFILTER_CFG table=filter:112 family=2 entries=8 op=nft_register_rule pid=4444 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:04:48.944000 audit[4444]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fff5e2e4680 a2=0 a3=7fff5e2e466c items=0 ppid=2114 pid=4444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:48.944000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:04:48.944000 audit[4424]: AVC avc: denied { bpf } for pid=4424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.944000 audit[4424]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4413 pid=4424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:48.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437343536633264343064396563396364326466623961386561363037 Dec 13 02:04:48.944000 audit[4424]: AVC avc: denied { perfmon } for pid=4424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.944000 audit[4424]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=4413 pid=4424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:48.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437343536633264343064396563396364326466623961386561363037 Dec 13 02:04:48.944000 audit[4424]: AVC avc: denied { bpf } for pid=4424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.944000 audit[4424]: AVC avc: denied { bpf } for pid=4424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.944000 audit[4424]: AVC avc: denied { bpf } for pid=4424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.944000 audit[4424]: AVC avc: denied { perfmon } for pid=4424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.944000 audit[4424]: AVC avc: denied { perfmon } for pid=4424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.944000 audit[4424]: AVC avc: denied { perfmon } for pid=4424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.944000 audit[4424]: AVC avc: denied { perfmon } for pid=4424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.944000 audit[4424]: AVC avc: denied { perfmon } for pid=4424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.944000 audit[4424]: AVC avc: denied { bpf } for pid=4424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.944000 audit[4424]: AVC avc: denied { bpf } for pid=4424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.944000 audit: BPF prog-id=204 op=LOAD Dec 13 02:04:48.944000 audit[4424]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001c2850 items=0 ppid=4413 pid=4424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:48.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437343536633264343064396563396364326466623961386561363037 Dec 13 02:04:48.944000 audit[4424]: AVC avc: denied { bpf } for pid=4424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.944000 audit[4424]: AVC avc: denied { bpf } for pid=4424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.944000 audit[4424]: AVC avc: denied { perfmon } for pid=4424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.944000 audit[4424]: AVC avc: denied { perfmon } for pid=4424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.944000 audit[4424]: AVC avc: denied { perfmon } for pid=4424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.944000 audit[4424]: AVC avc: denied { perfmon } for pid=4424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.944000 audit[4424]: AVC avc: denied { perfmon } for pid=4424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.944000 audit[4424]: AVC avc: denied { bpf } for pid=4424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.944000 audit[4424]: AVC avc: denied { bpf } for pid=4424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.944000 audit: BPF prog-id=205 op=LOAD Dec 13 02:04:48.944000 audit[4424]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001c2898 items=0 ppid=4413 pid=4424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:48.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437343536633264343064396563396364326466623961386561363037 Dec 13 02:04:48.944000 audit: BPF prog-id=205 op=UNLOAD Dec 13 02:04:48.945000 audit: BPF prog-id=204 op=UNLOAD Dec 13 02:04:48.945000 audit[4424]: AVC avc: denied { bpf } for pid=4424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.945000 audit[4424]: AVC avc: denied { bpf } for pid=4424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.945000 audit[4424]: AVC avc: denied { bpf } for pid=4424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.945000 audit[4424]: AVC avc: denied { perfmon } for pid=4424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.945000 audit[4424]: AVC avc: denied { perfmon } for pid=4424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.945000 audit[4424]: AVC avc: denied { perfmon } for pid=4424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.945000 audit[4424]: AVC avc: denied { perfmon } for pid=4424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.945000 audit[4424]: AVC avc: denied { perfmon } for pid=4424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.945000 audit[4424]: AVC avc: denied { bpf } for pid=4424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.945000 audit[4424]: AVC avc: denied { bpf } for pid=4424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:48.945000 audit: BPF prog-id=206 op=LOAD Dec 13 02:04:48.945000 audit[4424]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001c2ca8 items=0 ppid=4413 pid=4424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:48.945000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437343536633264343064396563396364326466623961386561363037 Dec 13 02:04:48.948347 systemd-resolved[1139]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 02:04:48.953000 audit[4444]: NETFILTER_CFG table=nat:113 family=2 entries=46 op=nft_register_rule pid=4444 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:04:48.953000 audit[4444]: SYSCALL arch=c000003e syscall=46 success=yes exit=14964 a0=3 a1=7fff5e2e4680 a2=0 a3=7fff5e2e466c items=0 ppid=2114 pid=4444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:48.953000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:04:48.966000 audit[4446]: NETFILTER_CFG table=filter:114 family=2 entries=8 op=nft_register_rule pid=4446 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:04:48.966000 audit[4446]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffc83092530 a2=0 a3=7ffc8309251c items=0 ppid=2114 pid=4446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:48.966000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:04:48.979496 env[1201]: time="2024-12-13T02:04:48.979435766Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-844858f88f-xpmjh,Uid:f86c03bf-e3cf-46e2-8f7c-974a2bb1f8e6,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"d7456c2d40d9ec9cd2dfb9a8ea607b1cdcbcdf22a5587eb59d29cb128deec27f\"" Dec 13 02:04:48.982149 env[1201]: time="2024-12-13T02:04:48.982082581Z" level=info msg="CreateContainer within sandbox \"d7456c2d40d9ec9cd2dfb9a8ea607b1cdcbcdf22a5587eb59d29cb128deec27f\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 02:04:48.985000 audit[4446]: NETFILTER_CFG table=nat:115 family=2 entries=58 op=nft_register_chain pid=4446 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:04:48.985000 audit[4446]: SYSCALL arch=c000003e syscall=46 success=yes exit=20628 a0=3 a1=7ffc83092530 a2=0 a3=7ffc8309251c items=0 ppid=2114 pid=4446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:48.985000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:04:49.026640 env[1201]: time="2024-12-13T02:04:49.026589873Z" level=info msg="CreateContainer within sandbox \"d7456c2d40d9ec9cd2dfb9a8ea607b1cdcbcdf22a5587eb59d29cb128deec27f\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"e276ef0bd2b8268c79da59e27c2b94ab64d10bba23d0070b549aaa3e73a2d976\"" Dec 13 02:04:49.027653 env[1201]: time="2024-12-13T02:04:49.027605304Z" level=info msg="StartContainer for \"e276ef0bd2b8268c79da59e27c2b94ab64d10bba23d0070b549aaa3e73a2d976\"" Dec 13 02:04:49.052394 systemd[1]: Started cri-containerd-e276ef0bd2b8268c79da59e27c2b94ab64d10bba23d0070b549aaa3e73a2d976.scope. Dec 13 02:04:49.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:49.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:49.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:49.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:49.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:49.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:49.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:49.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:49.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:49.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:49.063000 audit: BPF prog-id=207 op=LOAD Dec 13 02:04:49.064000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:49.064000 audit[4463]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4413 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:49.064000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532373665663062643262383236386337396461353965323763326239 Dec 13 02:04:49.064000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:49.064000 audit[4463]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=4413 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:49.064000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532373665663062643262383236386337396461353965323763326239 Dec 13 02:04:49.064000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:49.064000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:49.064000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:49.064000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:49.064000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:49.064000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:49.064000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:49.064000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:49.064000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:49.064000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:49.064000 audit: BPF prog-id=208 op=LOAD Dec 13 02:04:49.064000 audit[4463]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0002131d0 items=0 ppid=4413 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:49.064000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532373665663062643262383236386337396461353965323763326239 Dec 13 02:04:49.064000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:49.064000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:49.064000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:49.064000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:49.064000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:49.064000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:49.064000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:49.064000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:49.064000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:49.064000 audit: BPF prog-id=209 op=LOAD Dec 13 02:04:49.064000 audit[4463]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000213218 items=0 ppid=4413 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:49.064000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532373665663062643262383236386337396461353965323763326239 Dec 13 02:04:49.064000 audit: BPF prog-id=209 op=UNLOAD Dec 13 02:04:49.064000 audit: BPF prog-id=208 op=UNLOAD Dec 13 02:04:49.064000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:49.064000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:49.064000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:49.064000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:49.064000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:49.064000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:49.064000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:49.064000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:49.064000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:49.064000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:49.064000 audit: BPF prog-id=210 op=LOAD Dec 13 02:04:49.064000 audit[4463]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000213628 items=0 ppid=4413 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:49.064000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532373665663062643262383236386337396461353965323763326239 Dec 13 02:04:49.092394 env[1201]: time="2024-12-13T02:04:49.092351643Z" level=info msg="StartContainer for \"e276ef0bd2b8268c79da59e27c2b94ab64d10bba23d0070b549aaa3e73a2d976\" returns successfully" Dec 13 02:04:49.375479 systemd-networkd[1025]: calia477857f151: Gained IPv6LL Dec 13 02:04:49.690066 env[1201]: time="2024-12-13T02:04:49.690031468Z" level=info msg="StopPodSandbox for \"b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8\"" Dec 13 02:04:49.761792 env[1201]: 2024-12-13 02:04:49.728 [WARNING][4511] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--559bn-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"691da589-3611-4441-99b1-bbdb62900b38", ResourceVersion:"1014", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 4, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"9386ec7e0fbf00c0b0a7ad57fc0b8586787813f2d3884e21482519aeb8c3977e", Pod:"csi-node-driver-559bn", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calied9d19c0b5f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:04:49.761792 env[1201]: 2024-12-13 02:04:49.728 [INFO][4511] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8" Dec 13 02:04:49.761792 env[1201]: 2024-12-13 02:04:49.728 [INFO][4511] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8" iface="eth0" netns="" Dec 13 02:04:49.761792 env[1201]: 2024-12-13 02:04:49.728 [INFO][4511] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8" Dec 13 02:04:49.761792 env[1201]: 2024-12-13 02:04:49.729 [INFO][4511] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8" Dec 13 02:04:49.761792 env[1201]: 2024-12-13 02:04:49.748 [INFO][4520] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8" HandleID="k8s-pod-network.b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8" Workload="localhost-k8s-csi--node--driver--559bn-eth0" Dec 13 02:04:49.761792 env[1201]: 2024-12-13 02:04:49.748 [INFO][4520] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:04:49.761792 env[1201]: 2024-12-13 02:04:49.748 [INFO][4520] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:04:49.761792 env[1201]: 2024-12-13 02:04:49.756 [WARNING][4520] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8" HandleID="k8s-pod-network.b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8" Workload="localhost-k8s-csi--node--driver--559bn-eth0" Dec 13 02:04:49.761792 env[1201]: 2024-12-13 02:04:49.756 [INFO][4520] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8" HandleID="k8s-pod-network.b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8" Workload="localhost-k8s-csi--node--driver--559bn-eth0" Dec 13 02:04:49.761792 env[1201]: 2024-12-13 02:04:49.757 [INFO][4520] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:04:49.761792 env[1201]: 2024-12-13 02:04:49.760 [INFO][4511] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8" Dec 13 02:04:49.762552 env[1201]: time="2024-12-13T02:04:49.761829407Z" level=info msg="TearDown network for sandbox \"b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8\" successfully" Dec 13 02:04:49.762552 env[1201]: time="2024-12-13T02:04:49.761870382Z" level=info msg="StopPodSandbox for \"b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8\" returns successfully" Dec 13 02:04:49.762668 env[1201]: time="2024-12-13T02:04:49.762639442Z" level=info msg="RemovePodSandbox for \"b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8\"" Dec 13 02:04:49.762737 env[1201]: time="2024-12-13T02:04:49.762674677Z" level=info msg="Forcibly stopping sandbox \"b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8\"" Dec 13 02:04:49.850399 env[1201]: 2024-12-13 02:04:49.801 [WARNING][4544] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--559bn-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"691da589-3611-4441-99b1-bbdb62900b38", ResourceVersion:"1014", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 4, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"9386ec7e0fbf00c0b0a7ad57fc0b8586787813f2d3884e21482519aeb8c3977e", Pod:"csi-node-driver-559bn", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calied9d19c0b5f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:04:49.850399 env[1201]: 2024-12-13 02:04:49.801 [INFO][4544] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8" Dec 13 02:04:49.850399 env[1201]: 2024-12-13 02:04:49.801 [INFO][4544] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8" iface="eth0" netns="" Dec 13 02:04:49.850399 env[1201]: 2024-12-13 02:04:49.801 [INFO][4544] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8" Dec 13 02:04:49.850399 env[1201]: 2024-12-13 02:04:49.801 [INFO][4544] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8" Dec 13 02:04:49.850399 env[1201]: 2024-12-13 02:04:49.840 [INFO][4551] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8" HandleID="k8s-pod-network.b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8" Workload="localhost-k8s-csi--node--driver--559bn-eth0" Dec 13 02:04:49.850399 env[1201]: 2024-12-13 02:04:49.840 [INFO][4551] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:04:49.850399 env[1201]: 2024-12-13 02:04:49.840 [INFO][4551] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:04:49.850399 env[1201]: 2024-12-13 02:04:49.845 [WARNING][4551] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8" HandleID="k8s-pod-network.b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8" Workload="localhost-k8s-csi--node--driver--559bn-eth0" Dec 13 02:04:49.850399 env[1201]: 2024-12-13 02:04:49.845 [INFO][4551] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8" HandleID="k8s-pod-network.b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8" Workload="localhost-k8s-csi--node--driver--559bn-eth0" Dec 13 02:04:49.850399 env[1201]: 2024-12-13 02:04:49.847 [INFO][4551] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:04:49.850399 env[1201]: 2024-12-13 02:04:49.848 [INFO][4544] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8" Dec 13 02:04:49.850964 env[1201]: time="2024-12-13T02:04:49.850904318Z" level=info msg="TearDown network for sandbox \"b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8\" successfully" Dec 13 02:04:49.892018 env[1201]: time="2024-12-13T02:04:49.891943133Z" level=info msg="RemovePodSandbox \"b46234beb07a1331726d4bdd2f44ece4179256aaffd9b75e260afc1f673551c8\" returns successfully" Dec 13 02:04:49.892535 env[1201]: time="2024-12-13T02:04:49.892505995Z" level=info msg="StopPodSandbox for \"82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37\"" Dec 13 02:04:49.931319 kubelet[1930]: E1213 02:04:49.931271 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:04:49.934000 audit[1817]: AVC avc: denied { watch } for pid=1817 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c652,c793 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:04:49.934000 audit[1817]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001c16ca0 a2=fc6 a3=0 items=0 ppid=1673 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c652,c793 key=(null) Dec 13 02:04:49.934000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:04:49.935000 audit[1817]: AVC avc: denied { watch } for pid=1817 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c652,c793 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:04:49.935000 audit[1817]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0016ba120 a2=fc6 a3=0 items=0 ppid=1673 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c652,c793 key=(null) Dec 13 02:04:49.935000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:04:49.935000 audit[1817]: AVC avc: denied { watch } for pid=1817 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c652,c793 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:04:49.935000 audit[1817]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0016ba180 a2=fc6 a3=0 items=0 ppid=1673 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c652,c793 key=(null) Dec 13 02:04:49.935000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:04:49.935000 audit[1817]: AVC avc: denied { watch } for pid=1817 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c652,c793 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:04:49.935000 audit[1817]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00330dc80 a2=fc6 a3=0 items=0 ppid=1673 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c652,c793 key=(null) Dec 13 02:04:49.935000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:04:49.947000 audit[4590]: NETFILTER_CFG table=filter:116 family=2 entries=8 op=nft_register_rule pid=4590 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:04:49.947000 audit[4590]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffe4a0edbd0 a2=0 a3=7ffe4a0edbbc items=0 ppid=2114 pid=4590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:49.947000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:04:49.953000 audit[4590]: NETFILTER_CFG table=nat:117 family=2 entries=30 op=nft_register_rule pid=4590 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:04:49.953000 audit[4590]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffe4a0edbd0 a2=0 a3=7ffe4a0edbbc items=0 ppid=2114 pid=4590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:49.953000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:04:49.976000 audit[4475]: AVC avc: denied { watch } for pid=4475 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_04_22.1284182418/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c247,c867 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c247,c867 tclass=file permissive=0 Dec 13 02:04:49.976000 audit[4475]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000acb5a0 a2=fc6 a3=0 items=0 ppid=4413 pid=4475 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c247,c867 key=(null) Dec 13 02:04:49.976000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:04:49.979555 env[1201]: 2024-12-13 02:04:49.944 [WARNING][4576] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--9zn6q-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"0d1882a6-9d8f-43ef-958e-b21696c8b1a8", ResourceVersion:"918", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 3, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4a2a12824229d0c79556b9d27c949792ecaee049ee82dd27ca324c7be68f1a4e", Pod:"coredns-6f6b679f8f-9zn6q", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7759d33f942", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:04:49.979555 env[1201]: 2024-12-13 02:04:49.945 [INFO][4576] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37" Dec 13 02:04:49.979555 env[1201]: 2024-12-13 02:04:49.945 [INFO][4576] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37" iface="eth0" netns="" Dec 13 02:04:49.979555 env[1201]: 2024-12-13 02:04:49.945 [INFO][4576] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37" Dec 13 02:04:49.979555 env[1201]: 2024-12-13 02:04:49.945 [INFO][4576] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37" Dec 13 02:04:49.979555 env[1201]: 2024-12-13 02:04:49.966 [INFO][4585] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37" HandleID="k8s-pod-network.82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37" Workload="localhost-k8s-coredns--6f6b679f8f--9zn6q-eth0" Dec 13 02:04:49.979555 env[1201]: 2024-12-13 02:04:49.966 [INFO][4585] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:04:49.979555 env[1201]: 2024-12-13 02:04:49.966 [INFO][4585] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:04:49.979555 env[1201]: 2024-12-13 02:04:49.972 [WARNING][4585] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37" HandleID="k8s-pod-network.82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37" Workload="localhost-k8s-coredns--6f6b679f8f--9zn6q-eth0" Dec 13 02:04:49.979555 env[1201]: 2024-12-13 02:04:49.972 [INFO][4585] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37" HandleID="k8s-pod-network.82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37" Workload="localhost-k8s-coredns--6f6b679f8f--9zn6q-eth0" Dec 13 02:04:49.979555 env[1201]: 2024-12-13 02:04:49.974 [INFO][4585] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:04:49.979555 env[1201]: 2024-12-13 02:04:49.978 [INFO][4576] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37" Dec 13 02:04:49.980092 env[1201]: time="2024-12-13T02:04:49.980054737Z" level=info msg="TearDown network for sandbox \"82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37\" successfully" Dec 13 02:04:49.980206 env[1201]: time="2024-12-13T02:04:49.980164248Z" level=info msg="StopPodSandbox for \"82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37\" returns successfully" Dec 13 02:04:49.980821 env[1201]: time="2024-12-13T02:04:49.980797269Z" level=info msg="RemovePodSandbox for \"82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37\"" Dec 13 02:04:49.980956 env[1201]: time="2024-12-13T02:04:49.980910286Z" level=info msg="Forcibly stopping sandbox \"82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37\"" Dec 13 02:04:50.071689 env[1201]: 2024-12-13 02:04:50.026 [WARNING][4610] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--9zn6q-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"0d1882a6-9d8f-43ef-958e-b21696c8b1a8", ResourceVersion:"918", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 3, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4a2a12824229d0c79556b9d27c949792ecaee049ee82dd27ca324c7be68f1a4e", Pod:"coredns-6f6b679f8f-9zn6q", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7759d33f942", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:04:50.071689 env[1201]: 2024-12-13 02:04:50.027 [INFO][4610] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37" Dec 13 02:04:50.071689 env[1201]: 2024-12-13 02:04:50.027 [INFO][4610] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37" iface="eth0" netns="" Dec 13 02:04:50.071689 env[1201]: 2024-12-13 02:04:50.027 [INFO][4610] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37" Dec 13 02:04:50.071689 env[1201]: 2024-12-13 02:04:50.027 [INFO][4610] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37" Dec 13 02:04:50.071689 env[1201]: 2024-12-13 02:04:50.057 [INFO][4618] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37" HandleID="k8s-pod-network.82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37" Workload="localhost-k8s-coredns--6f6b679f8f--9zn6q-eth0" Dec 13 02:04:50.071689 env[1201]: 2024-12-13 02:04:50.057 [INFO][4618] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:04:50.071689 env[1201]: 2024-12-13 02:04:50.057 [INFO][4618] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:04:50.071689 env[1201]: 2024-12-13 02:04:50.064 [WARNING][4618] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37" HandleID="k8s-pod-network.82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37" Workload="localhost-k8s-coredns--6f6b679f8f--9zn6q-eth0" Dec 13 02:04:50.071689 env[1201]: 2024-12-13 02:04:50.064 [INFO][4618] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37" HandleID="k8s-pod-network.82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37" Workload="localhost-k8s-coredns--6f6b679f8f--9zn6q-eth0" Dec 13 02:04:50.071689 env[1201]: 2024-12-13 02:04:50.067 [INFO][4618] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:04:50.071689 env[1201]: 2024-12-13 02:04:50.069 [INFO][4610] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37" Dec 13 02:04:50.072290 env[1201]: time="2024-12-13T02:04:50.071730332Z" level=info msg="TearDown network for sandbox \"82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37\" successfully" Dec 13 02:04:50.077675 env[1201]: time="2024-12-13T02:04:50.077593502Z" level=info msg="RemovePodSandbox \"82fe69000ea4e795939b5bfc24e0744931740cb787ab9a2365426f358e482f37\" returns successfully" Dec 13 02:04:50.078358 env[1201]: time="2024-12-13T02:04:50.078297997Z" level=info msg="StopPodSandbox for \"594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd\"" Dec 13 02:04:50.159859 env[1201]: 2024-12-13 02:04:50.124 [WARNING][4641] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--wgzqb-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"f1443aa5-1d21-4afb-99f6-5788e787fa3a", ResourceVersion:"1048", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 3, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"5cf63d9809f6362d82738e20893fd23387054c678db077b467ef453dd0cf27d4", Pod:"coredns-6f6b679f8f-wgzqb", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia477857f151", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:04:50.159859 env[1201]: 2024-12-13 02:04:50.124 [INFO][4641] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd" Dec 13 02:04:50.159859 env[1201]: 2024-12-13 02:04:50.124 [INFO][4641] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd" iface="eth0" netns="" Dec 13 02:04:50.159859 env[1201]: 2024-12-13 02:04:50.124 [INFO][4641] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd" Dec 13 02:04:50.159859 env[1201]: 2024-12-13 02:04:50.125 [INFO][4641] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd" Dec 13 02:04:50.159859 env[1201]: 2024-12-13 02:04:50.148 [INFO][4648] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd" HandleID="k8s-pod-network.594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd" Workload="localhost-k8s-coredns--6f6b679f8f--wgzqb-eth0" Dec 13 02:04:50.159859 env[1201]: 2024-12-13 02:04:50.148 [INFO][4648] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:04:50.159859 env[1201]: 2024-12-13 02:04:50.148 [INFO][4648] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:04:50.159859 env[1201]: 2024-12-13 02:04:50.154 [WARNING][4648] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd" HandleID="k8s-pod-network.594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd" Workload="localhost-k8s-coredns--6f6b679f8f--wgzqb-eth0" Dec 13 02:04:50.159859 env[1201]: 2024-12-13 02:04:50.154 [INFO][4648] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd" HandleID="k8s-pod-network.594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd" Workload="localhost-k8s-coredns--6f6b679f8f--wgzqb-eth0" Dec 13 02:04:50.159859 env[1201]: 2024-12-13 02:04:50.156 [INFO][4648] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:04:50.159859 env[1201]: 2024-12-13 02:04:50.158 [INFO][4641] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd" Dec 13 02:04:50.160551 env[1201]: time="2024-12-13T02:04:50.159894616Z" level=info msg="TearDown network for sandbox \"594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd\" successfully" Dec 13 02:04:50.160551 env[1201]: time="2024-12-13T02:04:50.159934179Z" level=info msg="StopPodSandbox for \"594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd\" returns successfully" Dec 13 02:04:50.160671 env[1201]: time="2024-12-13T02:04:50.160626361Z" level=info msg="RemovePodSandbox for \"594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd\"" Dec 13 02:04:50.160710 env[1201]: time="2024-12-13T02:04:50.160668708Z" level=info msg="Forcibly stopping sandbox \"594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd\"" Dec 13 02:04:50.231574 env[1201]: 2024-12-13 02:04:50.198 [WARNING][4671] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--wgzqb-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"f1443aa5-1d21-4afb-99f6-5788e787fa3a", ResourceVersion:"1048", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 3, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"5cf63d9809f6362d82738e20893fd23387054c678db077b467ef453dd0cf27d4", Pod:"coredns-6f6b679f8f-wgzqb", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia477857f151", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:04:50.231574 env[1201]: 2024-12-13 02:04:50.198 [INFO][4671] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd" Dec 13 02:04:50.231574 env[1201]: 2024-12-13 02:04:50.198 [INFO][4671] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd" iface="eth0" netns="" Dec 13 02:04:50.231574 env[1201]: 2024-12-13 02:04:50.198 [INFO][4671] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd" Dec 13 02:04:50.231574 env[1201]: 2024-12-13 02:04:50.198 [INFO][4671] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd" Dec 13 02:04:50.231574 env[1201]: 2024-12-13 02:04:50.217 [INFO][4678] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd" HandleID="k8s-pod-network.594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd" Workload="localhost-k8s-coredns--6f6b679f8f--wgzqb-eth0" Dec 13 02:04:50.231574 env[1201]: 2024-12-13 02:04:50.218 [INFO][4678] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:04:50.231574 env[1201]: 2024-12-13 02:04:50.218 [INFO][4678] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:04:50.231574 env[1201]: 2024-12-13 02:04:50.224 [WARNING][4678] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd" HandleID="k8s-pod-network.594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd" Workload="localhost-k8s-coredns--6f6b679f8f--wgzqb-eth0" Dec 13 02:04:50.231574 env[1201]: 2024-12-13 02:04:50.224 [INFO][4678] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd" HandleID="k8s-pod-network.594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd" Workload="localhost-k8s-coredns--6f6b679f8f--wgzqb-eth0" Dec 13 02:04:50.231574 env[1201]: 2024-12-13 02:04:50.225 [INFO][4678] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:04:50.231574 env[1201]: 2024-12-13 02:04:50.227 [INFO][4671] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd" Dec 13 02:04:50.231574 env[1201]: time="2024-12-13T02:04:50.229912264Z" level=info msg="TearDown network for sandbox \"594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd\" successfully" Dec 13 02:04:50.233552 env[1201]: time="2024-12-13T02:04:50.233521214Z" level=info msg="RemovePodSandbox \"594122dc74f5ba2f94f4e947fbbba6efd8bd0013d9f5a8d2979124bc90f027cd\" returns successfully" Dec 13 02:04:50.234004 env[1201]: time="2024-12-13T02:04:50.233967875Z" level=info msg="StopPodSandbox for \"0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47\"" Dec 13 02:04:50.308612 env[1201]: 2024-12-13 02:04:50.268 [WARNING][4701] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--844858f88f--dcngr-eth0", GenerateName:"calico-apiserver-844858f88f-", Namespace:"calico-apiserver", SelfLink:"", UID:"e2aa5408-7118-4e83-b2a0-4139d9b8393c", ResourceVersion:"974", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 4, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"844858f88f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"6d11c7f94fff1f9af410bd51e47b60361194998dda5fcd0346c76b30094c30af", Pod:"calico-apiserver-844858f88f-dcngr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0bc93bb69ef", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:04:50.308612 env[1201]: 2024-12-13 02:04:50.269 [INFO][4701] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47" Dec 13 02:04:50.308612 env[1201]: 2024-12-13 02:04:50.269 [INFO][4701] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47" iface="eth0" netns="" Dec 13 02:04:50.308612 env[1201]: 2024-12-13 02:04:50.269 [INFO][4701] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47" Dec 13 02:04:50.308612 env[1201]: 2024-12-13 02:04:50.269 [INFO][4701] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47" Dec 13 02:04:50.308612 env[1201]: 2024-12-13 02:04:50.292 [INFO][4709] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47" HandleID="k8s-pod-network.0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47" Workload="localhost-k8s-calico--apiserver--844858f88f--dcngr-eth0" Dec 13 02:04:50.308612 env[1201]: 2024-12-13 02:04:50.292 [INFO][4709] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:04:50.308612 env[1201]: 2024-12-13 02:04:50.292 [INFO][4709] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:04:50.308612 env[1201]: 2024-12-13 02:04:50.302 [WARNING][4709] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47" HandleID="k8s-pod-network.0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47" Workload="localhost-k8s-calico--apiserver--844858f88f--dcngr-eth0" Dec 13 02:04:50.308612 env[1201]: 2024-12-13 02:04:50.302 [INFO][4709] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47" HandleID="k8s-pod-network.0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47" Workload="localhost-k8s-calico--apiserver--844858f88f--dcngr-eth0" Dec 13 02:04:50.308612 env[1201]: 2024-12-13 02:04:50.304 [INFO][4709] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:04:50.308612 env[1201]: 2024-12-13 02:04:50.307 [INFO][4701] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47" Dec 13 02:04:50.309103 env[1201]: time="2024-12-13T02:04:50.308615827Z" level=info msg="TearDown network for sandbox \"0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47\" successfully" Dec 13 02:04:50.309103 env[1201]: time="2024-12-13T02:04:50.308647826Z" level=info msg="StopPodSandbox for \"0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47\" returns successfully" Dec 13 02:04:50.309154 env[1201]: time="2024-12-13T02:04:50.309139860Z" level=info msg="RemovePodSandbox for \"0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47\"" Dec 13 02:04:50.309230 env[1201]: time="2024-12-13T02:04:50.309163093Z" level=info msg="Forcibly stopping sandbox \"0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47\"" Dec 13 02:04:50.383033 env[1201]: 2024-12-13 02:04:50.344 [WARNING][4733] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--844858f88f--dcngr-eth0", GenerateName:"calico-apiserver-844858f88f-", Namespace:"calico-apiserver", SelfLink:"", UID:"e2aa5408-7118-4e83-b2a0-4139d9b8393c", ResourceVersion:"974", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 4, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"844858f88f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"6d11c7f94fff1f9af410bd51e47b60361194998dda5fcd0346c76b30094c30af", Pod:"calico-apiserver-844858f88f-dcngr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0bc93bb69ef", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:04:50.383033 env[1201]: 2024-12-13 02:04:50.344 [INFO][4733] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47" Dec 13 02:04:50.383033 env[1201]: 2024-12-13 02:04:50.344 [INFO][4733] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47" iface="eth0" netns="" Dec 13 02:04:50.383033 env[1201]: 2024-12-13 02:04:50.344 [INFO][4733] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47" Dec 13 02:04:50.383033 env[1201]: 2024-12-13 02:04:50.344 [INFO][4733] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47" Dec 13 02:04:50.383033 env[1201]: 2024-12-13 02:04:50.368 [INFO][4741] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47" HandleID="k8s-pod-network.0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47" Workload="localhost-k8s-calico--apiserver--844858f88f--dcngr-eth0" Dec 13 02:04:50.383033 env[1201]: 2024-12-13 02:04:50.369 [INFO][4741] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:04:50.383033 env[1201]: 2024-12-13 02:04:50.369 [INFO][4741] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:04:50.383033 env[1201]: 2024-12-13 02:04:50.378 [WARNING][4741] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47" HandleID="k8s-pod-network.0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47" Workload="localhost-k8s-calico--apiserver--844858f88f--dcngr-eth0" Dec 13 02:04:50.383033 env[1201]: 2024-12-13 02:04:50.378 [INFO][4741] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47" HandleID="k8s-pod-network.0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47" Workload="localhost-k8s-calico--apiserver--844858f88f--dcngr-eth0" Dec 13 02:04:50.383033 env[1201]: 2024-12-13 02:04:50.379 [INFO][4741] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:04:50.383033 env[1201]: 2024-12-13 02:04:50.381 [INFO][4733] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47" Dec 13 02:04:50.383735 env[1201]: time="2024-12-13T02:04:50.383071489Z" level=info msg="TearDown network for sandbox \"0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47\" successfully" Dec 13 02:04:50.386447 env[1201]: time="2024-12-13T02:04:50.386414469Z" level=info msg="RemovePodSandbox \"0bf588c4f1dc6f20a1e0697ed79417933293ef2ebac9dfc5a785388a55c02b47\" returns successfully" Dec 13 02:04:50.386928 env[1201]: time="2024-12-13T02:04:50.386893419Z" level=info msg="StopPodSandbox for \"6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76\"" Dec 13 02:04:50.447280 env[1201]: 2024-12-13 02:04:50.418 [WARNING][4764] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--6f7685584c--tn7w2-eth0", GenerateName:"calico-kube-controllers-6f7685584c-", Namespace:"calico-system", SelfLink:"", UID:"da007ed8-1e90-41d5-a725-d1c3c3736c1f", ResourceVersion:"949", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 4, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6f7685584c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"61fc3a651d5175a79ac855d09cd95783ef94a6f5768ca9577d790f6f63b62bf3", Pod:"calico-kube-controllers-6f7685584c-tn7w2", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali32538723edb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:04:50.447280 env[1201]: 2024-12-13 02:04:50.418 [INFO][4764] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76" Dec 13 02:04:50.447280 env[1201]: 2024-12-13 02:04:50.418 [INFO][4764] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76" iface="eth0" netns="" Dec 13 02:04:50.447280 env[1201]: 2024-12-13 02:04:50.418 [INFO][4764] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76" Dec 13 02:04:50.447280 env[1201]: 2024-12-13 02:04:50.418 [INFO][4764] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76" Dec 13 02:04:50.447280 env[1201]: 2024-12-13 02:04:50.438 [INFO][4772] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76" HandleID="k8s-pod-network.6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76" Workload="localhost-k8s-calico--kube--controllers--6f7685584c--tn7w2-eth0" Dec 13 02:04:50.447280 env[1201]: 2024-12-13 02:04:50.438 [INFO][4772] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:04:50.447280 env[1201]: 2024-12-13 02:04:50.438 [INFO][4772] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:04:50.447280 env[1201]: 2024-12-13 02:04:50.443 [WARNING][4772] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76" HandleID="k8s-pod-network.6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76" Workload="localhost-k8s-calico--kube--controllers--6f7685584c--tn7w2-eth0" Dec 13 02:04:50.447280 env[1201]: 2024-12-13 02:04:50.443 [INFO][4772] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76" HandleID="k8s-pod-network.6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76" Workload="localhost-k8s-calico--kube--controllers--6f7685584c--tn7w2-eth0" Dec 13 02:04:50.447280 env[1201]: 2024-12-13 02:04:50.444 [INFO][4772] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:04:50.447280 env[1201]: 2024-12-13 02:04:50.445 [INFO][4764] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76" Dec 13 02:04:50.447877 env[1201]: time="2024-12-13T02:04:50.447834383Z" level=info msg="TearDown network for sandbox \"6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76\" successfully" Dec 13 02:04:50.447965 env[1201]: time="2024-12-13T02:04:50.447944605Z" level=info msg="StopPodSandbox for \"6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76\" returns successfully" Dec 13 02:04:50.448574 env[1201]: time="2024-12-13T02:04:50.448526724Z" level=info msg="RemovePodSandbox for \"6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76\"" Dec 13 02:04:50.448633 env[1201]: time="2024-12-13T02:04:50.448564344Z" level=info msg="Forcibly stopping sandbox \"6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76\"" Dec 13 02:04:50.508709 env[1201]: 2024-12-13 02:04:50.480 [WARNING][4795] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--6f7685584c--tn7w2-eth0", GenerateName:"calico-kube-controllers-6f7685584c-", Namespace:"calico-system", SelfLink:"", UID:"da007ed8-1e90-41d5-a725-d1c3c3736c1f", ResourceVersion:"949", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 4, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6f7685584c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"61fc3a651d5175a79ac855d09cd95783ef94a6f5768ca9577d790f6f63b62bf3", Pod:"calico-kube-controllers-6f7685584c-tn7w2", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali32538723edb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:04:50.508709 env[1201]: 2024-12-13 02:04:50.480 [INFO][4795] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76" Dec 13 02:04:50.508709 env[1201]: 2024-12-13 02:04:50.480 [INFO][4795] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76" iface="eth0" netns="" Dec 13 02:04:50.508709 env[1201]: 2024-12-13 02:04:50.480 [INFO][4795] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76" Dec 13 02:04:50.508709 env[1201]: 2024-12-13 02:04:50.480 [INFO][4795] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76" Dec 13 02:04:50.508709 env[1201]: 2024-12-13 02:04:50.499 [INFO][4802] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76" HandleID="k8s-pod-network.6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76" Workload="localhost-k8s-calico--kube--controllers--6f7685584c--tn7w2-eth0" Dec 13 02:04:50.508709 env[1201]: 2024-12-13 02:04:50.499 [INFO][4802] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:04:50.508709 env[1201]: 2024-12-13 02:04:50.499 [INFO][4802] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:04:50.508709 env[1201]: 2024-12-13 02:04:50.504 [WARNING][4802] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76" HandleID="k8s-pod-network.6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76" Workload="localhost-k8s-calico--kube--controllers--6f7685584c--tn7w2-eth0" Dec 13 02:04:50.508709 env[1201]: 2024-12-13 02:04:50.504 [INFO][4802] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76" HandleID="k8s-pod-network.6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76" Workload="localhost-k8s-calico--kube--controllers--6f7685584c--tn7w2-eth0" Dec 13 02:04:50.508709 env[1201]: 2024-12-13 02:04:50.505 [INFO][4802] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:04:50.508709 env[1201]: 2024-12-13 02:04:50.507 [INFO][4795] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76" Dec 13 02:04:50.509354 env[1201]: time="2024-12-13T02:04:50.508641139Z" level=info msg="TearDown network for sandbox \"6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76\" successfully" Dec 13 02:04:50.515308 env[1201]: time="2024-12-13T02:04:50.515255761Z" level=info msg="RemovePodSandbox \"6770da893baa3637ffb029771cae688eb8992f86e617b1d32462b54b7e0cca76\" returns successfully" Dec 13 02:04:50.515756 env[1201]: time="2024-12-13T02:04:50.515726145Z" level=info msg="StopPodSandbox for \"a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8\"" Dec 13 02:04:50.568219 env[1201]: 2024-12-13 02:04:50.542 [WARNING][4824] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--844858f88f--xpmjh-eth0", GenerateName:"calico-apiserver-844858f88f-", Namespace:"calico-apiserver", SelfLink:"", UID:"f86c03bf-e3cf-46e2-8f7c-974a2bb1f8e6", ResourceVersion:"1066", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 4, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"844858f88f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"d7456c2d40d9ec9cd2dfb9a8ea607b1cdcbcdf22a5587eb59d29cb128deec27f", Pod:"calico-apiserver-844858f88f-xpmjh", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali32625e8413b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:04:50.568219 env[1201]: 2024-12-13 02:04:50.543 [INFO][4824] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8" Dec 13 02:04:50.568219 env[1201]: 2024-12-13 02:04:50.543 [INFO][4824] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8" iface="eth0" netns="" Dec 13 02:04:50.568219 env[1201]: 2024-12-13 02:04:50.543 [INFO][4824] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8" Dec 13 02:04:50.568219 env[1201]: 2024-12-13 02:04:50.543 [INFO][4824] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8" Dec 13 02:04:50.568219 env[1201]: 2024-12-13 02:04:50.559 [INFO][4832] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8" HandleID="k8s-pod-network.a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8" Workload="localhost-k8s-calico--apiserver--844858f88f--xpmjh-eth0" Dec 13 02:04:50.568219 env[1201]: 2024-12-13 02:04:50.559 [INFO][4832] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:04:50.568219 env[1201]: 2024-12-13 02:04:50.560 [INFO][4832] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:04:50.568219 env[1201]: 2024-12-13 02:04:50.564 [WARNING][4832] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8" HandleID="k8s-pod-network.a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8" Workload="localhost-k8s-calico--apiserver--844858f88f--xpmjh-eth0" Dec 13 02:04:50.568219 env[1201]: 2024-12-13 02:04:50.564 [INFO][4832] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8" HandleID="k8s-pod-network.a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8" Workload="localhost-k8s-calico--apiserver--844858f88f--xpmjh-eth0" Dec 13 02:04:50.568219 env[1201]: 2024-12-13 02:04:50.565 [INFO][4832] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:04:50.568219 env[1201]: 2024-12-13 02:04:50.567 [INFO][4824] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8" Dec 13 02:04:50.569369 env[1201]: time="2024-12-13T02:04:50.568258100Z" level=info msg="TearDown network for sandbox \"a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8\" successfully" Dec 13 02:04:50.569369 env[1201]: time="2024-12-13T02:04:50.568296440Z" level=info msg="StopPodSandbox for \"a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8\" returns successfully" Dec 13 02:04:50.569369 env[1201]: time="2024-12-13T02:04:50.568767365Z" level=info msg="RemovePodSandbox for \"a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8\"" Dec 13 02:04:50.569369 env[1201]: time="2024-12-13T02:04:50.568798513Z" level=info msg="Forcibly stopping sandbox \"a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8\"" Dec 13 02:04:50.625941 env[1201]: 2024-12-13 02:04:50.597 [WARNING][4854] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--844858f88f--xpmjh-eth0", GenerateName:"calico-apiserver-844858f88f-", Namespace:"calico-apiserver", SelfLink:"", UID:"f86c03bf-e3cf-46e2-8f7c-974a2bb1f8e6", ResourceVersion:"1066", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 4, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"844858f88f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"d7456c2d40d9ec9cd2dfb9a8ea607b1cdcbcdf22a5587eb59d29cb128deec27f", Pod:"calico-apiserver-844858f88f-xpmjh", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali32625e8413b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:04:50.625941 env[1201]: 2024-12-13 02:04:50.597 [INFO][4854] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8" Dec 13 02:04:50.625941 env[1201]: 2024-12-13 02:04:50.597 [INFO][4854] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8" iface="eth0" netns="" Dec 13 02:04:50.625941 env[1201]: 2024-12-13 02:04:50.597 [INFO][4854] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8" Dec 13 02:04:50.625941 env[1201]: 2024-12-13 02:04:50.597 [INFO][4854] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8" Dec 13 02:04:50.625941 env[1201]: 2024-12-13 02:04:50.615 [INFO][4862] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8" HandleID="k8s-pod-network.a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8" Workload="localhost-k8s-calico--apiserver--844858f88f--xpmjh-eth0" Dec 13 02:04:50.625941 env[1201]: 2024-12-13 02:04:50.616 [INFO][4862] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:04:50.625941 env[1201]: 2024-12-13 02:04:50.616 [INFO][4862] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:04:50.625941 env[1201]: 2024-12-13 02:04:50.621 [WARNING][4862] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8" HandleID="k8s-pod-network.a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8" Workload="localhost-k8s-calico--apiserver--844858f88f--xpmjh-eth0" Dec 13 02:04:50.625941 env[1201]: 2024-12-13 02:04:50.621 [INFO][4862] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8" HandleID="k8s-pod-network.a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8" Workload="localhost-k8s-calico--apiserver--844858f88f--xpmjh-eth0" Dec 13 02:04:50.625941 env[1201]: 2024-12-13 02:04:50.622 [INFO][4862] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:04:50.625941 env[1201]: 2024-12-13 02:04:50.624 [INFO][4854] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8" Dec 13 02:04:50.626740 env[1201]: time="2024-12-13T02:04:50.625965592Z" level=info msg="TearDown network for sandbox \"a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8\" successfully" Dec 13 02:04:50.631072 env[1201]: time="2024-12-13T02:04:50.631018294Z" level=info msg="RemovePodSandbox \"a76349261c11f396adcc98fed731113183238a9c26e30adccf094f7a5f1704b8\" returns successfully" Dec 13 02:04:50.847411 systemd-networkd[1025]: cali32625e8413b: Gained IPv6LL Dec 13 02:04:50.935786 kubelet[1930]: E1213 02:04:50.935683 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:04:50.937887 kubelet[1930]: I1213 02:04:50.937861 1930 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 02:04:52.316292 systemd[1]: Started sshd@14-10.0.0.95:22-10.0.0.1:40586.service. Dec 13 02:04:52.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.95:22-10.0.0.1:40586 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:52.322260 kernel: kauditd_printk_skb: 292 callbacks suppressed Dec 13 02:04:52.322344 kernel: audit: type=1130 audit(1734055492.315:1412): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.95:22-10.0.0.1:40586 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:52.359000 audit[4871]: USER_ACCT pid=4871 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:52.360982 sshd[4871]: Accepted publickey for core from 10.0.0.1 port 40586 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:04:52.362851 sshd[4871]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:04:52.361000 audit[4871]: CRED_ACQ pid=4871 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:52.366927 systemd-logind[1186]: New session 15 of user core. Dec 13 02:04:52.368009 systemd[1]: Started session-15.scope. Dec 13 02:04:52.369912 kernel: audit: type=1101 audit(1734055492.359:1413): pid=4871 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:52.369954 kernel: audit: type=1103 audit(1734055492.361:1414): pid=4871 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:52.369998 kernel: audit: type=1006 audit(1734055492.361:1415): pid=4871 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Dec 13 02:04:52.361000 audit[4871]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4c31a4d0 a2=3 a3=0 items=0 ppid=1 pid=4871 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:52.376929 kernel: audit: type=1300 audit(1734055492.361:1415): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4c31a4d0 a2=3 a3=0 items=0 ppid=1 pid=4871 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:52.377304 kernel: audit: type=1327 audit(1734055492.361:1415): proctitle=737368643A20636F7265205B707269765D Dec 13 02:04:52.361000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:04:52.371000 audit[4871]: USER_START pid=4871 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:52.382677 kernel: audit: type=1105 audit(1734055492.371:1416): pid=4871 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:52.382722 kernel: audit: type=1103 audit(1734055492.373:1417): pid=4873 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:52.373000 audit[4873]: CRED_ACQ pid=4873 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:52.462173 systemd[1]: run-containerd-runc-k8s.io-32960b14428542e503779e67e0ee1f0c18752d5705b95f333a06b3bf1ecbddcd-runc.Ek9XI9.mount: Deactivated successfully. Dec 13 02:04:52.540312 sshd[4871]: pam_unix(sshd:session): session closed for user core Dec 13 02:04:52.540000 audit[4871]: USER_END pid=4871 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:52.542635 systemd[1]: sshd@14-10.0.0.95:22-10.0.0.1:40586.service: Deactivated successfully. Dec 13 02:04:52.543430 systemd[1]: session-15.scope: Deactivated successfully. Dec 13 02:04:52.544009 systemd-logind[1186]: Session 15 logged out. Waiting for processes to exit. Dec 13 02:04:52.544848 systemd-logind[1186]: Removed session 15. Dec 13 02:04:52.540000 audit[4871]: CRED_DISP pid=4871 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:52.549881 kernel: audit: type=1106 audit(1734055492.540:1418): pid=4871 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:52.549945 kernel: audit: type=1104 audit(1734055492.540:1419): pid=4871 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:52.541000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.95:22-10.0.0.1:40586 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:54.557898 systemd[1]: run-containerd-runc-k8s.io-b1b78e00139ef1e7e992cdbe2fb445a4be4829a2ca3a0496a680a7fe7fcf4f9a-runc.0otoZ9.mount: Deactivated successfully. Dec 13 02:04:54.604797 kubelet[1930]: E1213 02:04:54.604751 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:04:54.618855 kubelet[1930]: I1213 02:04:54.618770 1930 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-844858f88f-xpmjh" podStartSLOduration=50.618751586 podStartE2EDuration="50.618751586s" podCreationTimestamp="2024-12-13 02:04:04 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:04:49.940662422 +0000 UTC m=+60.312868714" watchObservedRunningTime="2024-12-13 02:04:54.618751586 +0000 UTC m=+64.990957878" Dec 13 02:04:57.546127 systemd[1]: Started sshd@15-10.0.0.95:22-10.0.0.1:44160.service. Dec 13 02:04:57.545000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.95:22-10.0.0.1:44160 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:57.550730 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 02:04:57.550797 kernel: audit: type=1130 audit(1734055497.545:1421): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.95:22-10.0.0.1:44160 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:57.589000 audit[4938]: USER_ACCT pid=4938 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:57.590508 sshd[4938]: Accepted publickey for core from 10.0.0.1 port 44160 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:04:57.593860 sshd[4938]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:04:57.592000 audit[4938]: CRED_ACQ pid=4938 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:57.597354 systemd-logind[1186]: New session 16 of user core. Dec 13 02:04:57.598145 systemd[1]: Started session-16.scope. Dec 13 02:04:57.598925 kernel: audit: type=1101 audit(1734055497.589:1422): pid=4938 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:57.598980 kernel: audit: type=1103 audit(1734055497.592:1423): pid=4938 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:57.601430 kernel: audit: type=1006 audit(1734055497.592:1424): pid=4938 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Dec 13 02:04:57.601475 kernel: audit: type=1300 audit(1734055497.592:1424): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff301b6070 a2=3 a3=0 items=0 ppid=1 pid=4938 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:57.592000 audit[4938]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff301b6070 a2=3 a3=0 items=0 ppid=1 pid=4938 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:57.592000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:04:57.612771 kernel: audit: type=1327 audit(1734055497.592:1424): proctitle=737368643A20636F7265205B707269765D Dec 13 02:04:57.612808 kernel: audit: type=1105 audit(1734055497.600:1425): pid=4938 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:57.600000 audit[4938]: USER_START pid=4938 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:57.602000 audit[4940]: CRED_ACQ pid=4940 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:57.620739 kernel: audit: type=1103 audit(1734055497.602:1426): pid=4940 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:57.715976 sshd[4938]: pam_unix(sshd:session): session closed for user core Dec 13 02:04:57.715000 audit[4938]: USER_END pid=4938 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:57.718438 systemd[1]: sshd@15-10.0.0.95:22-10.0.0.1:44160.service: Deactivated successfully. Dec 13 02:04:57.719161 systemd[1]: session-16.scope: Deactivated successfully. Dec 13 02:04:57.719683 systemd-logind[1186]: Session 16 logged out. Waiting for processes to exit. Dec 13 02:04:57.720503 systemd-logind[1186]: Removed session 16. Dec 13 02:04:57.715000 audit[4938]: CRED_DISP pid=4938 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:57.724908 kernel: audit: type=1106 audit(1734055497.715:1427): pid=4938 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:57.724980 kernel: audit: type=1104 audit(1734055497.715:1428): pid=4938 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:04:57.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.95:22-10.0.0.1:44160 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:02.720498 systemd[1]: Started sshd@16-10.0.0.95:22-10.0.0.1:44164.service. Dec 13 02:05:02.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.95:22-10.0.0.1:44164 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:02.721867 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 02:05:02.721926 kernel: audit: type=1130 audit(1734055502.719:1430): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.95:22-10.0.0.1:44164 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:02.759000 audit[4956]: USER_ACCT pid=4956 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:02.759943 sshd[4956]: Accepted publickey for core from 10.0.0.1 port 44164 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:05:02.761698 sshd[4956]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:05:02.760000 audit[4956]: CRED_ACQ pid=4956 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:02.765127 systemd-logind[1186]: New session 17 of user core. Dec 13 02:05:02.765867 systemd[1]: Started session-17.scope. Dec 13 02:05:02.768565 kernel: audit: type=1101 audit(1734055502.759:1431): pid=4956 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:02.768625 kernel: audit: type=1103 audit(1734055502.760:1432): pid=4956 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:02.768671 kernel: audit: type=1006 audit(1734055502.760:1433): pid=4956 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Dec 13 02:05:02.771215 kernel: audit: type=1300 audit(1734055502.760:1433): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0d9cdc10 a2=3 a3=0 items=0 ppid=1 pid=4956 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:02.760000 audit[4956]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0d9cdc10 a2=3 a3=0 items=0 ppid=1 pid=4956 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:02.760000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:05:02.776765 kernel: audit: type=1327 audit(1734055502.760:1433): proctitle=737368643A20636F7265205B707269765D Dec 13 02:05:02.776800 kernel: audit: type=1105 audit(1734055502.770:1434): pid=4956 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:02.770000 audit[4956]: USER_START pid=4956 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:02.771000 audit[4958]: CRED_ACQ pid=4958 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:02.784508 kernel: audit: type=1103 audit(1734055502.771:1435): pid=4958 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:02.873257 sshd[4956]: pam_unix(sshd:session): session closed for user core Dec 13 02:05:02.872000 audit[4956]: USER_END pid=4956 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:02.875309 systemd[1]: sshd@16-10.0.0.95:22-10.0.0.1:44164.service: Deactivated successfully. Dec 13 02:05:02.876001 systemd[1]: session-17.scope: Deactivated successfully. Dec 13 02:05:02.876488 systemd-logind[1186]: Session 17 logged out. Waiting for processes to exit. Dec 13 02:05:02.877171 systemd-logind[1186]: Removed session 17. Dec 13 02:05:02.872000 audit[4956]: CRED_DISP pid=4956 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:02.881950 kernel: audit: type=1106 audit(1734055502.872:1436): pid=4956 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:02.882002 kernel: audit: type=1104 audit(1734055502.872:1437): pid=4956 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:02.875000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.95:22-10.0.0.1:44164 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:07.876000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.95:22-10.0.0.1:42830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:07.877868 systemd[1]: Started sshd@17-10.0.0.95:22-10.0.0.1:42830.service. Dec 13 02:05:07.879051 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 02:05:07.879103 kernel: audit: type=1130 audit(1734055507.876:1439): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.95:22-10.0.0.1:42830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:07.919000 audit[4970]: USER_ACCT pid=4970 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:07.920819 sshd[4970]: Accepted publickey for core from 10.0.0.1 port 42830 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:05:07.922851 sshd[4970]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:05:07.921000 audit[4970]: CRED_ACQ pid=4970 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:07.926512 systemd-logind[1186]: New session 18 of user core. Dec 13 02:05:07.927287 systemd[1]: Started session-18.scope. Dec 13 02:05:07.929008 kernel: audit: type=1101 audit(1734055507.919:1440): pid=4970 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:07.929153 kernel: audit: type=1103 audit(1734055507.921:1441): pid=4970 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:07.929204 kernel: audit: type=1006 audit(1734055507.921:1442): pid=4970 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Dec 13 02:05:07.931312 kernel: audit: type=1300 audit(1734055507.921:1442): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff07c9f440 a2=3 a3=0 items=0 ppid=1 pid=4970 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:07.921000 audit[4970]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff07c9f440 a2=3 a3=0 items=0 ppid=1 pid=4970 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:07.935279 kernel: audit: type=1327 audit(1734055507.921:1442): proctitle=737368643A20636F7265205B707269765D Dec 13 02:05:07.921000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:05:07.930000 audit[4970]: USER_START pid=4970 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:07.940826 kernel: audit: type=1105 audit(1734055507.930:1443): pid=4970 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:07.940886 kernel: audit: type=1103 audit(1734055507.931:1444): pid=4972 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:07.931000 audit[4972]: CRED_ACQ pid=4972 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:08.042278 sshd[4970]: pam_unix(sshd:session): session closed for user core Dec 13 02:05:08.042000 audit[4970]: USER_END pid=4970 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:08.045169 systemd[1]: Started sshd@18-10.0.0.95:22-10.0.0.1:42846.service. Dec 13 02:05:08.045644 systemd[1]: sshd@17-10.0.0.95:22-10.0.0.1:42830.service: Deactivated successfully. Dec 13 02:05:08.046143 systemd[1]: session-18.scope: Deactivated successfully. Dec 13 02:05:08.042000 audit[4970]: CRED_DISP pid=4970 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:08.049546 systemd-logind[1186]: Session 18 logged out. Waiting for processes to exit. Dec 13 02:05:08.050424 systemd-logind[1186]: Removed session 18. Dec 13 02:05:08.051212 kernel: audit: type=1106 audit(1734055508.042:1445): pid=4970 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:08.051275 kernel: audit: type=1104 audit(1734055508.042:1446): pid=4970 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:08.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.95:22-10.0.0.1:42846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:08.042000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.95:22-10.0.0.1:42830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:08.084000 audit[4982]: USER_ACCT pid=4982 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:08.085715 sshd[4982]: Accepted publickey for core from 10.0.0.1 port 42846 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:05:08.086000 audit[4982]: CRED_ACQ pid=4982 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:08.086000 audit[4982]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdeffe1110 a2=3 a3=0 items=0 ppid=1 pid=4982 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:08.086000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:05:08.086842 sshd[4982]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:05:08.090562 systemd-logind[1186]: New session 19 of user core. Dec 13 02:05:08.091411 systemd[1]: Started session-19.scope. Dec 13 02:05:08.095000 audit[4982]: USER_START pid=4982 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:08.095000 audit[4985]: CRED_ACQ pid=4985 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:08.352896 sshd[4982]: pam_unix(sshd:session): session closed for user core Dec 13 02:05:08.353000 audit[4982]: USER_END pid=4982 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:08.353000 audit[4982]: CRED_DISP pid=4982 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:08.356610 systemd[1]: Started sshd@19-10.0.0.95:22-10.0.0.1:42854.service. Dec 13 02:05:08.355000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.95:22-10.0.0.1:42854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:08.357182 systemd[1]: sshd@18-10.0.0.95:22-10.0.0.1:42846.service: Deactivated successfully. Dec 13 02:05:08.356000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.95:22-10.0.0.1:42846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:08.357808 systemd[1]: session-19.scope: Deactivated successfully. Dec 13 02:05:08.358474 systemd-logind[1186]: Session 19 logged out. Waiting for processes to exit. Dec 13 02:05:08.359352 systemd-logind[1186]: Removed session 19. Dec 13 02:05:08.394000 audit[4993]: USER_ACCT pid=4993 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:08.396138 sshd[4993]: Accepted publickey for core from 10.0.0.1 port 42854 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:05:08.395000 audit[4993]: CRED_ACQ pid=4993 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:08.395000 audit[4993]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5aeb70d0 a2=3 a3=0 items=0 ppid=1 pid=4993 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:08.395000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:05:08.397124 sshd[4993]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:05:08.400686 systemd-logind[1186]: New session 20 of user core. Dec 13 02:05:08.402080 systemd[1]: Started session-20.scope. Dec 13 02:05:08.404000 audit[4993]: USER_START pid=4993 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:08.405000 audit[4996]: CRED_ACQ pid=4996 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:09.885000 audit[5010]: NETFILTER_CFG table=filter:118 family=2 entries=20 op=nft_register_rule pid=5010 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:05:09.885000 audit[5010]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffef91acf80 a2=0 a3=7ffef91acf6c items=0 ppid=2114 pid=5010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:09.885000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:05:09.895000 audit[5010]: NETFILTER_CFG table=nat:119 family=2 entries=22 op=nft_register_rule pid=5010 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:05:09.895000 audit[5010]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffef91acf80 a2=0 a3=0 items=0 ppid=2114 pid=5010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:09.895000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:05:09.898138 sshd[4993]: pam_unix(sshd:session): session closed for user core Dec 13 02:05:09.898000 audit[4993]: USER_END pid=4993 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:09.898000 audit[4993]: CRED_DISP pid=4993 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:09.900000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.95:22-10.0.0.1:42854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:09.901145 systemd[1]: sshd@19-10.0.0.95:22-10.0.0.1:42854.service: Deactivated successfully. Dec 13 02:05:09.901728 systemd[1]: session-20.scope: Deactivated successfully. Dec 13 02:05:09.903918 systemd[1]: Started sshd@20-10.0.0.95:22-10.0.0.1:42858.service. Dec 13 02:05:09.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.95:22-10.0.0.1:42858 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:09.904434 systemd-logind[1186]: Session 20 logged out. Waiting for processes to exit. Dec 13 02:05:09.907846 systemd-logind[1186]: Removed session 20. Dec 13 02:05:09.909000 audit[5015]: NETFILTER_CFG table=filter:120 family=2 entries=32 op=nft_register_rule pid=5015 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:05:09.909000 audit[5015]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffc88bf73a0 a2=0 a3=7ffc88bf738c items=0 ppid=2114 pid=5015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:09.909000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:05:09.913000 audit[5015]: NETFILTER_CFG table=nat:121 family=2 entries=22 op=nft_register_rule pid=5015 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:05:09.913000 audit[5015]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc88bf73a0 a2=0 a3=0 items=0 ppid=2114 pid=5015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:09.913000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:05:09.950000 audit[5013]: USER_ACCT pid=5013 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:09.952075 sshd[5013]: Accepted publickey for core from 10.0.0.1 port 42858 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:05:09.951000 audit[5013]: CRED_ACQ pid=5013 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:09.951000 audit[5013]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc249179f0 a2=3 a3=0 items=0 ppid=1 pid=5013 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:09.951000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:05:09.953043 sshd[5013]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:05:09.956391 systemd-logind[1186]: New session 21 of user core. Dec 13 02:05:09.957140 systemd[1]: Started session-21.scope. Dec 13 02:05:09.960000 audit[5013]: USER_START pid=5013 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:09.961000 audit[5017]: CRED_ACQ pid=5017 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:10.241941 sshd[5013]: pam_unix(sshd:session): session closed for user core Dec 13 02:05:10.241000 audit[5013]: USER_END pid=5013 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:10.241000 audit[5013]: CRED_DISP pid=5013 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:10.244000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.95:22-10.0.0.1:42858 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:10.245433 systemd[1]: sshd@20-10.0.0.95:22-10.0.0.1:42858.service: Deactivated successfully. Dec 13 02:05:10.245990 systemd[1]: session-21.scope: Deactivated successfully. Dec 13 02:05:10.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.95:22-10.0.0.1:42864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:10.246807 systemd-logind[1186]: Session 21 logged out. Waiting for processes to exit. Dec 13 02:05:10.248800 systemd[1]: Started sshd@21-10.0.0.95:22-10.0.0.1:42864.service. Dec 13 02:05:10.250821 systemd-logind[1186]: Removed session 21. Dec 13 02:05:10.288000 audit[5026]: USER_ACCT pid=5026 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:10.289937 sshd[5026]: Accepted publickey for core from 10.0.0.1 port 42864 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:05:10.289000 audit[5026]: CRED_ACQ pid=5026 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:10.289000 audit[5026]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff92291590 a2=3 a3=0 items=0 ppid=1 pid=5026 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:10.289000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:05:10.291378 sshd[5026]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:05:10.295840 systemd-logind[1186]: New session 22 of user core. Dec 13 02:05:10.296707 systemd[1]: Started session-22.scope. Dec 13 02:05:10.301000 audit[5026]: USER_START pid=5026 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:10.303000 audit[5028]: CRED_ACQ pid=5028 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:10.410830 sshd[5026]: pam_unix(sshd:session): session closed for user core Dec 13 02:05:10.410000 audit[5026]: USER_END pid=5026 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:10.410000 audit[5026]: CRED_DISP pid=5026 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:10.413654 systemd[1]: sshd@21-10.0.0.95:22-10.0.0.1:42864.service: Deactivated successfully. Dec 13 02:05:10.412000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.95:22-10.0.0.1:42864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:10.414492 systemd[1]: session-22.scope: Deactivated successfully. Dec 13 02:05:10.415067 systemd-logind[1186]: Session 22 logged out. Waiting for processes to exit. Dec 13 02:05:10.415827 systemd-logind[1186]: Removed session 22. Dec 13 02:05:15.415960 systemd[1]: Started sshd@22-10.0.0.95:22-10.0.0.1:42872.service. Dec 13 02:05:15.417125 kernel: kauditd_printk_skb: 57 callbacks suppressed Dec 13 02:05:15.417174 kernel: audit: type=1130 audit(1734055515.414:1488): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.95:22-10.0.0.1:42872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:15.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.95:22-10.0.0.1:42872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:15.453000 audit[5040]: USER_ACCT pid=5040 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:15.455355 sshd[5040]: Accepted publickey for core from 10.0.0.1 port 42872 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:05:15.457887 sshd[5040]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:05:15.456000 audit[5040]: CRED_ACQ pid=5040 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:15.462308 systemd-logind[1186]: New session 23 of user core. Dec 13 02:05:15.463209 kernel: audit: type=1101 audit(1734055515.453:1489): pid=5040 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:15.463267 kernel: audit: type=1103 audit(1734055515.456:1490): pid=5040 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:15.463293 kernel: audit: type=1006 audit(1734055515.456:1491): pid=5040 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Dec 13 02:05:15.463293 systemd[1]: Started session-23.scope. Dec 13 02:05:15.467920 kernel: audit: type=1300 audit(1734055515.456:1491): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc29d959a0 a2=3 a3=0 items=0 ppid=1 pid=5040 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:15.456000 audit[5040]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc29d959a0 a2=3 a3=0 items=0 ppid=1 pid=5040 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:15.469841 kernel: audit: type=1327 audit(1734055515.456:1491): proctitle=737368643A20636F7265205B707269765D Dec 13 02:05:15.456000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:05:15.466000 audit[5040]: USER_START pid=5040 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:15.475506 kernel: audit: type=1105 audit(1734055515.466:1492): pid=5040 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:15.475561 kernel: audit: type=1103 audit(1734055515.468:1493): pid=5042 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:15.468000 audit[5042]: CRED_ACQ pid=5042 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:15.573782 sshd[5040]: pam_unix(sshd:session): session closed for user core Dec 13 02:05:15.573000 audit[5040]: USER_END pid=5040 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:15.576374 systemd[1]: sshd@22-10.0.0.95:22-10.0.0.1:42872.service: Deactivated successfully. Dec 13 02:05:15.577348 systemd[1]: session-23.scope: Deactivated successfully. Dec 13 02:05:15.577918 systemd-logind[1186]: Session 23 logged out. Waiting for processes to exit. Dec 13 02:05:15.578663 systemd-logind[1186]: Removed session 23. Dec 13 02:05:15.573000 audit[5040]: CRED_DISP pid=5040 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:15.583177 kernel: audit: type=1106 audit(1734055515.573:1494): pid=5040 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:15.583260 kernel: audit: type=1104 audit(1734055515.573:1495): pid=5040 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:15.575000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.95:22-10.0.0.1:42872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:16.038345 kubelet[1930]: I1213 02:05:16.038297 1930 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 02:05:16.219000 audit[5060]: NETFILTER_CFG table=filter:122 family=2 entries=32 op=nft_register_rule pid=5060 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:05:16.219000 audit[5060]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffd87efd310 a2=0 a3=7ffd87efd2fc items=0 ppid=2114 pid=5060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:16.219000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:05:16.223000 audit[5060]: NETFILTER_CFG table=nat:123 family=2 entries=34 op=nft_register_chain pid=5060 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:05:16.223000 audit[5060]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffd87efd310 a2=0 a3=7ffd87efd2fc items=0 ppid=2114 pid=5060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:16.223000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:05:16.703295 kubelet[1930]: E1213 02:05:16.703253 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:05:17.512000 audit[5062]: NETFILTER_CFG table=filter:124 family=2 entries=20 op=nft_register_rule pid=5062 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:05:17.512000 audit[5062]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fffccfbd6c0 a2=0 a3=7fffccfbd6ac items=0 ppid=2114 pid=5062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.512000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:05:17.518000 audit[5062]: NETFILTER_CFG table=nat:125 family=2 entries=106 op=nft_register_chain pid=5062 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:05:17.518000 audit[5062]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fffccfbd6c0 a2=0 a3=7fffccfbd6ac items=0 ppid=2114 pid=5062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:17.518000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:05:20.577848 systemd[1]: Started sshd@23-10.0.0.95:22-10.0.0.1:50386.service. Dec 13 02:05:20.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.95:22-10.0.0.1:50386 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:20.579028 kernel: kauditd_printk_skb: 13 callbacks suppressed Dec 13 02:05:20.579084 kernel: audit: type=1130 audit(1734055520.576:1501): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.95:22-10.0.0.1:50386 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:20.620000 audit[5085]: USER_ACCT pid=5085 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:20.622450 sshd[5085]: Accepted publickey for core from 10.0.0.1 port 50386 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:05:20.627240 kernel: audit: type=1101 audit(1734055520.620:1502): pid=5085 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:20.627362 kernel: audit: type=1103 audit(1734055520.626:1503): pid=5085 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:20.626000 audit[5085]: CRED_ACQ pid=5085 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:20.627728 sshd[5085]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:05:20.631557 systemd-logind[1186]: New session 24 of user core. Dec 13 02:05:20.632418 systemd[1]: Started session-24.scope. Dec 13 02:05:20.635130 kernel: audit: type=1006 audit(1734055520.626:1504): pid=5085 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Dec 13 02:05:20.635218 kernel: audit: type=1300 audit(1734055520.626:1504): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd737cfb0 a2=3 a3=0 items=0 ppid=1 pid=5085 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:20.626000 audit[5085]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd737cfb0 a2=3 a3=0 items=0 ppid=1 pid=5085 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:20.626000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:05:20.641654 kernel: audit: type=1327 audit(1734055520.626:1504): proctitle=737368643A20636F7265205B707269765D Dec 13 02:05:20.641990 kernel: audit: type=1105 audit(1734055520.635:1505): pid=5085 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:20.635000 audit[5085]: USER_START pid=5085 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:20.636000 audit[5087]: CRED_ACQ pid=5087 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:20.650253 kernel: audit: type=1103 audit(1734055520.636:1506): pid=5087 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:20.747799 sshd[5085]: pam_unix(sshd:session): session closed for user core Dec 13 02:05:20.747000 audit[5085]: USER_END pid=5085 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:20.750293 systemd[1]: sshd@23-10.0.0.95:22-10.0.0.1:50386.service: Deactivated successfully. Dec 13 02:05:20.751029 systemd[1]: session-24.scope: Deactivated successfully. Dec 13 02:05:20.751824 systemd-logind[1186]: Session 24 logged out. Waiting for processes to exit. Dec 13 02:05:20.752490 systemd-logind[1186]: Removed session 24. Dec 13 02:05:20.747000 audit[5085]: CRED_DISP pid=5085 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:20.759059 kernel: audit: type=1106 audit(1734055520.747:1507): pid=5085 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:20.759140 kernel: audit: type=1104 audit(1734055520.747:1508): pid=5085 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:20.749000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.95:22-10.0.0.1:50386 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:21.703550 kubelet[1930]: E1213 02:05:21.703503 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:05:25.703630 kubelet[1930]: E1213 02:05:25.703591 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:05:25.752758 systemd[1]: Started sshd@24-10.0.0.95:22-10.0.0.1:50388.service. Dec 13 02:05:25.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.95:22-10.0.0.1:50388 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:25.754284 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 02:05:25.754337 kernel: audit: type=1130 audit(1734055525.751:1510): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.95:22-10.0.0.1:50388 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:25.795000 audit[5141]: USER_ACCT pid=5141 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:25.797071 sshd[5141]: Accepted publickey for core from 10.0.0.1 port 50388 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:05:25.799000 audit[5141]: CRED_ACQ pid=5141 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:25.801567 sshd[5141]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:05:25.805232 kernel: audit: type=1101 audit(1734055525.795:1511): pid=5141 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:25.805353 kernel: audit: type=1103 audit(1734055525.799:1512): pid=5141 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:25.805382 kernel: audit: type=1006 audit(1734055525.799:1513): pid=5141 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Dec 13 02:05:25.805578 systemd-logind[1186]: New session 25 of user core. Dec 13 02:05:25.806771 systemd[1]: Started session-25.scope. Dec 13 02:05:25.799000 audit[5141]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9c374050 a2=3 a3=0 items=0 ppid=1 pid=5141 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.812548 kernel: audit: type=1300 audit(1734055525.799:1513): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9c374050 a2=3 a3=0 items=0 ppid=1 pid=5141 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.814155 kernel: audit: type=1327 audit(1734055525.799:1513): proctitle=737368643A20636F7265205B707269765D Dec 13 02:05:25.799000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:05:25.810000 audit[5141]: USER_START pid=5141 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:25.811000 audit[5143]: CRED_ACQ pid=5143 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:25.822892 kernel: audit: type=1105 audit(1734055525.810:1514): pid=5141 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:25.822953 kernel: audit: type=1103 audit(1734055525.811:1515): pid=5143 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:25.935576 sshd[5141]: pam_unix(sshd:session): session closed for user core Dec 13 02:05:25.935000 audit[5141]: USER_END pid=5141 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:25.937981 systemd[1]: sshd@24-10.0.0.95:22-10.0.0.1:50388.service: Deactivated successfully. Dec 13 02:05:25.939000 systemd[1]: session-25.scope: Deactivated successfully. Dec 13 02:05:25.939771 systemd-logind[1186]: Session 25 logged out. Waiting for processes to exit. Dec 13 02:05:25.940539 systemd-logind[1186]: Removed session 25. Dec 13 02:05:25.935000 audit[5141]: CRED_DISP pid=5141 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:25.945581 kernel: audit: type=1106 audit(1734055525.935:1516): pid=5141 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:25.945631 kernel: audit: type=1104 audit(1734055525.935:1517): pid=5141 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:25.935000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.95:22-10.0.0.1:50388 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:28.703170 kubelet[1930]: E1213 02:05:28.703118 1930 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:05:30.941518 systemd[1]: Started sshd@25-10.0.0.95:22-10.0.0.1:53206.service. Dec 13 02:05:30.940000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.95:22-10.0.0.1:53206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:30.942656 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 02:05:30.942712 kernel: audit: type=1130 audit(1734055530.940:1519): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.95:22-10.0.0.1:53206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:30.980000 audit[5158]: USER_ACCT pid=5158 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:30.982285 sshd[5158]: Accepted publickey for core from 10.0.0.1 port 53206 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:05:30.984000 audit[5158]: CRED_ACQ pid=5158 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:30.986477 sshd[5158]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:05:30.989727 kernel: audit: type=1101 audit(1734055530.980:1520): pid=5158 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:30.989784 kernel: audit: type=1103 audit(1734055530.984:1521): pid=5158 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:30.989808 kernel: audit: type=1006 audit(1734055530.984:1522): pid=5158 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Dec 13 02:05:30.990234 systemd-logind[1186]: New session 26 of user core. Dec 13 02:05:30.991102 systemd[1]: Started session-26.scope. Dec 13 02:05:30.992086 kernel: audit: type=1300 audit(1734055530.984:1522): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff60e36cf0 a2=3 a3=0 items=0 ppid=1 pid=5158 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:30.984000 audit[5158]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff60e36cf0 a2=3 a3=0 items=0 ppid=1 pid=5158 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:30.995994 kernel: audit: type=1327 audit(1734055530.984:1522): proctitle=737368643A20636F7265205B707269765D Dec 13 02:05:30.984000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:05:30.997343 kernel: audit: type=1105 audit(1734055530.993:1523): pid=5158 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:30.993000 audit[5158]: USER_START pid=5158 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:31.001568 kernel: audit: type=1103 audit(1734055530.995:1524): pid=5160 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:30.995000 audit[5160]: CRED_ACQ pid=5160 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:31.097864 sshd[5158]: pam_unix(sshd:session): session closed for user core Dec 13 02:05:31.097000 audit[5158]: USER_END pid=5158 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:31.100079 systemd[1]: sshd@25-10.0.0.95:22-10.0.0.1:53206.service: Deactivated successfully. Dec 13 02:05:31.100849 systemd[1]: session-26.scope: Deactivated successfully. Dec 13 02:05:31.101618 systemd-logind[1186]: Session 26 logged out. Waiting for processes to exit. Dec 13 02:05:31.102321 systemd-logind[1186]: Removed session 26. Dec 13 02:05:31.097000 audit[5158]: CRED_DISP pid=5158 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:31.106749 kernel: audit: type=1106 audit(1734055531.097:1525): pid=5158 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:31.106810 kernel: audit: type=1104 audit(1734055531.097:1526): pid=5158 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:05:31.097000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.95:22-10.0.0.1:53206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'