Dec 13 14:27:30.177269 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Dec 13 12:55:10 -00 2024 Dec 13 14:27:30.177295 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:27:30.177303 kernel: BIOS-provided physical RAM map: Dec 13 14:27:30.177309 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Dec 13 14:27:30.177314 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Dec 13 14:27:30.177320 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Dec 13 14:27:30.177327 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000009cfdbfff] usable Dec 13 14:27:30.177333 kernel: BIOS-e820: [mem 0x000000009cfdc000-0x000000009cffffff] reserved Dec 13 14:27:30.177340 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Dec 13 14:27:30.177345 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved Dec 13 14:27:30.177351 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Dec 13 14:27:30.177357 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Dec 13 14:27:30.177363 kernel: BIOS-e820: [mem 0x000000fd00000000-0x000000ffffffffff] reserved Dec 13 14:27:30.177370 kernel: NX (Execute Disable) protection: active Dec 13 14:27:30.177379 kernel: SMBIOS 2.8 present. Dec 13 14:27:30.177387 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 Dec 13 14:27:30.177394 kernel: Hypervisor detected: KVM Dec 13 14:27:30.177400 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 13 14:27:30.177406 kernel: kvm-clock: cpu 0, msr 6a19a001, primary cpu clock Dec 13 14:27:30.177412 kernel: kvm-clock: using sched offset of 3610460152 cycles Dec 13 14:27:30.177419 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 13 14:27:30.177428 kernel: tsc: Detected 2794.748 MHz processor Dec 13 14:27:30.177434 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 14:27:30.177442 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 14:27:30.177449 kernel: last_pfn = 0x9cfdc max_arch_pfn = 0x400000000 Dec 13 14:27:30.177455 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 14:27:30.177461 kernel: Using GB pages for direct mapping Dec 13 14:27:30.177467 kernel: ACPI: Early table checksum verification disabled Dec 13 14:27:30.177474 kernel: ACPI: RSDP 0x00000000000F59D0 000014 (v00 BOCHS ) Dec 13 14:27:30.177480 kernel: ACPI: RSDT 0x000000009CFE2408 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:27:30.177486 kernel: ACPI: FACP 0x000000009CFE21E8 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:27:30.177492 kernel: ACPI: DSDT 0x000000009CFE0040 0021A8 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:27:30.177500 kernel: ACPI: FACS 0x000000009CFE0000 000040 Dec 13 14:27:30.177506 kernel: ACPI: APIC 0x000000009CFE22DC 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:27:30.177512 kernel: ACPI: HPET 0x000000009CFE236C 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:27:30.177518 kernel: ACPI: MCFG 0x000000009CFE23A4 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:27:30.177524 kernel: ACPI: WAET 0x000000009CFE23E0 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:27:30.177531 kernel: ACPI: Reserving FACP table memory at [mem 0x9cfe21e8-0x9cfe22db] Dec 13 14:27:30.177537 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cfe0040-0x9cfe21e7] Dec 13 14:27:30.177543 kernel: ACPI: Reserving FACS table memory at [mem 0x9cfe0000-0x9cfe003f] Dec 13 14:27:30.177553 kernel: ACPI: Reserving APIC table memory at [mem 0x9cfe22dc-0x9cfe236b] Dec 13 14:27:30.177560 kernel: ACPI: Reserving HPET table memory at [mem 0x9cfe236c-0x9cfe23a3] Dec 13 14:27:30.177567 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cfe23a4-0x9cfe23df] Dec 13 14:27:30.177573 kernel: ACPI: Reserving WAET table memory at [mem 0x9cfe23e0-0x9cfe2407] Dec 13 14:27:30.177580 kernel: No NUMA configuration found Dec 13 14:27:30.177587 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cfdbfff] Dec 13 14:27:30.177595 kernel: NODE_DATA(0) allocated [mem 0x9cfd6000-0x9cfdbfff] Dec 13 14:27:30.177601 kernel: Zone ranges: Dec 13 14:27:30.177608 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 14:27:30.177614 kernel: DMA32 [mem 0x0000000001000000-0x000000009cfdbfff] Dec 13 14:27:30.177621 kernel: Normal empty Dec 13 14:27:30.177627 kernel: Movable zone start for each node Dec 13 14:27:30.177634 kernel: Early memory node ranges Dec 13 14:27:30.177641 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Dec 13 14:27:30.177647 kernel: node 0: [mem 0x0000000000100000-0x000000009cfdbfff] Dec 13 14:27:30.177655 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cfdbfff] Dec 13 14:27:30.177664 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 14:27:30.177671 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Dec 13 14:27:30.177678 kernel: On node 0, zone DMA32: 12324 pages in unavailable ranges Dec 13 14:27:30.177684 kernel: ACPI: PM-Timer IO Port: 0x608 Dec 13 14:27:30.177691 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 13 14:27:30.177697 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Dec 13 14:27:30.177704 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Dec 13 14:27:30.177711 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 13 14:27:30.177718 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 14:27:30.177726 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 13 14:27:30.177732 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 13 14:27:30.177739 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 14:27:30.177748 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Dec 13 14:27:30.177754 kernel: TSC deadline timer available Dec 13 14:27:30.177761 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Dec 13 14:27:30.177768 kernel: kvm-guest: KVM setup pv remote TLB flush Dec 13 14:27:30.177774 kernel: kvm-guest: setup PV sched yield Dec 13 14:27:30.177781 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices Dec 13 14:27:30.177790 kernel: Booting paravirtualized kernel on KVM Dec 13 14:27:30.177797 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 14:27:30.177803 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Dec 13 14:27:30.177810 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 Dec 13 14:27:30.177827 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 Dec 13 14:27:30.177833 kernel: pcpu-alloc: [0] 0 1 2 3 Dec 13 14:27:30.177840 kernel: kvm-guest: setup async PF for cpu 0 Dec 13 14:27:30.177847 kernel: kvm-guest: stealtime: cpu 0, msr 9a41c0c0 Dec 13 14:27:30.177853 kernel: kvm-guest: PV spinlocks enabled Dec 13 14:27:30.177862 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Dec 13 14:27:30.177868 kernel: Built 1 zonelists, mobility grouping on. Total pages: 632732 Dec 13 14:27:30.177875 kernel: Policy zone: DMA32 Dec 13 14:27:30.177882 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:27:30.177890 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 14:27:30.177896 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Dec 13 14:27:30.177903 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 14:27:30.177910 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 14:27:30.177918 kernel: Memory: 2436696K/2571752K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47472K init, 4112K bss, 134796K reserved, 0K cma-reserved) Dec 13 14:27:30.177925 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Dec 13 14:27:30.177931 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 14:27:30.177938 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 14:27:30.177945 kernel: rcu: Hierarchical RCU implementation. Dec 13 14:27:30.177952 kernel: rcu: RCU event tracing is enabled. Dec 13 14:27:30.177959 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Dec 13 14:27:30.177966 kernel: Rude variant of Tasks RCU enabled. Dec 13 14:27:30.177972 kernel: Tracing variant of Tasks RCU enabled. Dec 13 14:27:30.177980 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 14:27:30.177987 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Dec 13 14:27:30.177994 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Dec 13 14:27:30.178000 kernel: random: crng init done Dec 13 14:27:30.178007 kernel: Console: colour VGA+ 80x25 Dec 13 14:27:30.178015 kernel: printk: console [ttyS0] enabled Dec 13 14:27:30.178029 kernel: ACPI: Core revision 20210730 Dec 13 14:27:30.178040 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Dec 13 14:27:30.178048 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 14:27:30.178060 kernel: x2apic enabled Dec 13 14:27:30.178132 kernel: Switched APIC routing to physical x2apic. Dec 13 14:27:30.178141 kernel: kvm-guest: setup PV IPIs Dec 13 14:27:30.178147 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Dec 13 14:27:30.178154 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Dec 13 14:27:30.178165 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) Dec 13 14:27:30.178172 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Dec 13 14:27:30.178178 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Dec 13 14:27:30.178185 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Dec 13 14:27:30.178199 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 14:27:30.178206 kernel: Spectre V2 : Mitigation: Retpolines Dec 13 14:27:30.178213 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 14:27:30.178222 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 14:27:30.178229 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Dec 13 14:27:30.178236 kernel: RETBleed: Mitigation: untrained return thunk Dec 13 14:27:30.178243 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 13 14:27:30.178250 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 13 14:27:30.178257 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 14:27:30.178265 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 14:27:30.178272 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 14:27:30.178279 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 14:27:30.178286 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Dec 13 14:27:30.178293 kernel: Freeing SMP alternatives memory: 32K Dec 13 14:27:30.178300 kernel: pid_max: default: 32768 minimum: 301 Dec 13 14:27:30.178307 kernel: LSM: Security Framework initializing Dec 13 14:27:30.178315 kernel: SELinux: Initializing. Dec 13 14:27:30.178324 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 14:27:30.178338 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 14:27:30.178349 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) Dec 13 14:27:30.178357 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Dec 13 14:27:30.178366 kernel: ... version: 0 Dec 13 14:27:30.178374 kernel: ... bit width: 48 Dec 13 14:27:30.178383 kernel: ... generic registers: 6 Dec 13 14:27:30.178391 kernel: ... value mask: 0000ffffffffffff Dec 13 14:27:30.178404 kernel: ... max period: 00007fffffffffff Dec 13 14:27:30.178435 kernel: ... fixed-purpose events: 0 Dec 13 14:27:30.178461 kernel: ... event mask: 000000000000003f Dec 13 14:27:30.178469 kernel: signal: max sigframe size: 1776 Dec 13 14:27:30.178476 kernel: rcu: Hierarchical SRCU implementation. Dec 13 14:27:30.178483 kernel: smp: Bringing up secondary CPUs ... Dec 13 14:27:30.178490 kernel: x86: Booting SMP configuration: Dec 13 14:27:30.178497 kernel: .... node #0, CPUs: #1 Dec 13 14:27:30.178504 kernel: kvm-clock: cpu 1, msr 6a19a041, secondary cpu clock Dec 13 14:27:30.178511 kernel: kvm-guest: setup async PF for cpu 1 Dec 13 14:27:30.178525 kernel: kvm-guest: stealtime: cpu 1, msr 9a49c0c0 Dec 13 14:27:30.178532 kernel: #2 Dec 13 14:27:30.178539 kernel: kvm-clock: cpu 2, msr 6a19a081, secondary cpu clock Dec 13 14:27:30.178546 kernel: kvm-guest: setup async PF for cpu 2 Dec 13 14:27:30.178553 kernel: kvm-guest: stealtime: cpu 2, msr 9a51c0c0 Dec 13 14:27:30.178560 kernel: #3 Dec 13 14:27:30.178567 kernel: kvm-clock: cpu 3, msr 6a19a0c1, secondary cpu clock Dec 13 14:27:30.178574 kernel: kvm-guest: setup async PF for cpu 3 Dec 13 14:27:30.178583 kernel: kvm-guest: stealtime: cpu 3, msr 9a59c0c0 Dec 13 14:27:30.178594 kernel: smp: Brought up 1 node, 4 CPUs Dec 13 14:27:30.178601 kernel: smpboot: Max logical packages: 1 Dec 13 14:27:30.178608 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) Dec 13 14:27:30.178615 kernel: devtmpfs: initialized Dec 13 14:27:30.178622 kernel: x86/mm: Memory block size: 128MB Dec 13 14:27:30.178639 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 14:27:30.178655 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Dec 13 14:27:30.178663 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 14:27:30.178670 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 14:27:30.178679 kernel: audit: initializing netlink subsys (disabled) Dec 13 14:27:30.178686 kernel: audit: type=2000 audit(1734100049.183:1): state=initialized audit_enabled=0 res=1 Dec 13 14:27:30.178693 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 14:27:30.178700 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 14:27:30.178707 kernel: cpuidle: using governor menu Dec 13 14:27:30.178714 kernel: ACPI: bus type PCI registered Dec 13 14:27:30.178721 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 14:27:30.178728 kernel: dca service started, version 1.12.1 Dec 13 14:27:30.178735 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Dec 13 14:27:30.178744 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Dec 13 14:27:30.178751 kernel: PCI: Using configuration type 1 for base access Dec 13 14:27:30.178758 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 14:27:30.178765 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 14:27:30.178772 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 14:27:30.178779 kernel: ACPI: Added _OSI(Module Device) Dec 13 14:27:30.178787 kernel: ACPI: Added _OSI(Processor Device) Dec 13 14:27:30.178802 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 14:27:30.178811 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 14:27:30.178839 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 14:27:30.178848 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 14:27:30.178857 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 14:27:30.178866 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 14:27:30.178875 kernel: ACPI: Interpreter enabled Dec 13 14:27:30.178882 kernel: ACPI: PM: (supports S0 S3 S5) Dec 13 14:27:30.178890 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 14:27:30.178899 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 14:27:30.178908 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Dec 13 14:27:30.178920 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 13 14:27:30.179163 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Dec 13 14:27:30.179289 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] Dec 13 14:27:30.179371 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] Dec 13 14:27:30.179381 kernel: PCI host bridge to bus 0000:00 Dec 13 14:27:30.180164 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 14:27:30.185253 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 14:27:30.185361 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 14:27:30.185438 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] Dec 13 14:27:30.185538 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Dec 13 14:27:30.185610 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x8ffffffff window] Dec 13 14:27:30.185703 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 13 14:27:30.185807 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Dec 13 14:27:30.185946 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 Dec 13 14:27:30.186022 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfd000000-0xfdffffff pref] Dec 13 14:27:30.186122 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xfebd0000-0xfebd0fff] Dec 13 14:27:30.186198 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfebc0000-0xfebcffff pref] Dec 13 14:27:30.186271 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 14:27:30.186361 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 Dec 13 14:27:30.186439 kernel: pci 0000:00:02.0: reg 0x10: [io 0xc0c0-0xc0df] Dec 13 14:27:30.186521 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xfebd1000-0xfebd1fff] Dec 13 14:27:30.186595 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfe000000-0xfe003fff 64bit pref] Dec 13 14:27:30.186690 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 Dec 13 14:27:30.186766 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc000-0xc07f] Dec 13 14:27:30.186852 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebd2000-0xfebd2fff] Dec 13 14:27:30.186927 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe004000-0xfe007fff 64bit pref] Dec 13 14:27:30.187017 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Dec 13 14:27:30.187114 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc0e0-0xc0ff] Dec 13 14:27:30.187191 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebd3000-0xfebd3fff] Dec 13 14:27:30.187265 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe008000-0xfe00bfff 64bit pref] Dec 13 14:27:30.187339 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfeb80000-0xfebbffff pref] Dec 13 14:27:30.187430 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Dec 13 14:27:30.187505 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Dec 13 14:27:30.187607 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Dec 13 14:27:30.187691 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc100-0xc11f] Dec 13 14:27:30.187792 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfebd4000-0xfebd4fff] Dec 13 14:27:30.187916 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Dec 13 14:27:30.187993 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] Dec 13 14:27:30.188003 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 13 14:27:30.188011 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 13 14:27:30.188018 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 14:27:30.188033 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 13 14:27:30.188040 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 Dec 13 14:27:30.188047 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 Dec 13 14:27:30.188054 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Dec 13 14:27:30.188061 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Dec 13 14:27:30.188081 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 Dec 13 14:27:30.188088 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 Dec 13 14:27:30.188095 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 Dec 13 14:27:30.188103 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 Dec 13 14:27:30.188112 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 Dec 13 14:27:30.188119 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 Dec 13 14:27:30.188126 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 Dec 13 14:27:30.188133 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 Dec 13 14:27:30.188140 kernel: iommu: Default domain type: Translated Dec 13 14:27:30.188147 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 14:27:30.188225 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Dec 13 14:27:30.188333 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 14:27:30.188429 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Dec 13 14:27:30.188439 kernel: vgaarb: loaded Dec 13 14:27:30.188447 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 14:27:30.188454 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 14:27:30.188478 kernel: PTP clock support registered Dec 13 14:27:30.188487 kernel: PCI: Using ACPI for IRQ routing Dec 13 14:27:30.188494 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 14:27:30.188502 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Dec 13 14:27:30.188509 kernel: e820: reserve RAM buffer [mem 0x9cfdc000-0x9fffffff] Dec 13 14:27:30.188519 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Dec 13 14:27:30.188526 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Dec 13 14:27:30.188534 kernel: clocksource: Switched to clocksource kvm-clock Dec 13 14:27:30.188555 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 14:27:30.188563 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 14:27:30.188570 kernel: pnp: PnP ACPI init Dec 13 14:27:30.188705 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved Dec 13 14:27:30.188717 kernel: pnp: PnP ACPI: found 6 devices Dec 13 14:27:30.188728 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 14:27:30.188750 kernel: NET: Registered PF_INET protocol family Dec 13 14:27:30.188758 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 14:27:30.188765 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Dec 13 14:27:30.188772 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 14:27:30.188780 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 14:27:30.188800 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Dec 13 14:27:30.188808 kernel: TCP: Hash tables configured (established 32768 bind 32768) Dec 13 14:27:30.188815 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 14:27:30.188835 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 14:27:30.188843 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 14:27:30.188850 kernel: NET: Registered PF_XDP protocol family Dec 13 14:27:30.188941 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 14:27:30.189035 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 14:27:30.189158 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 14:27:30.189252 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] Dec 13 14:27:30.189398 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Dec 13 14:27:30.189534 kernel: pci_bus 0000:00: resource 9 [mem 0x100000000-0x8ffffffff window] Dec 13 14:27:30.189568 kernel: PCI: CLS 0 bytes, default 64 Dec 13 14:27:30.189577 kernel: Initialise system trusted keyrings Dec 13 14:27:30.189585 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Dec 13 14:27:30.189592 kernel: Key type asymmetric registered Dec 13 14:27:30.189599 kernel: Asymmetric key parser 'x509' registered Dec 13 14:27:30.189606 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 14:27:30.189613 kernel: io scheduler mq-deadline registered Dec 13 14:27:30.189620 kernel: io scheduler kyber registered Dec 13 14:27:30.189628 kernel: io scheduler bfq registered Dec 13 14:27:30.189651 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 14:27:30.189659 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 Dec 13 14:27:30.189666 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 Dec 13 14:27:30.189674 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 Dec 13 14:27:30.189681 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 14:27:30.189688 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 14:27:30.189708 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 13 14:27:30.189717 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 14:27:30.189724 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 14:27:30.189867 kernel: rtc_cmos 00:04: RTC can wake from S4 Dec 13 14:27:30.189880 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 14:27:30.189985 kernel: rtc_cmos 00:04: registered as rtc0 Dec 13 14:27:30.190139 kernel: rtc_cmos 00:04: setting system clock to 2024-12-13T14:27:29 UTC (1734100049) Dec 13 14:27:30.190280 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Dec 13 14:27:30.190295 kernel: NET: Registered PF_INET6 protocol family Dec 13 14:27:30.190304 kernel: Segment Routing with IPv6 Dec 13 14:27:30.190330 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 14:27:30.190350 kernel: NET: Registered PF_PACKET protocol family Dec 13 14:27:30.190359 kernel: Key type dns_resolver registered Dec 13 14:27:30.190368 kernel: IPI shorthand broadcast: enabled Dec 13 14:27:30.190378 kernel: sched_clock: Marking stable (476043986, 109621310)->(653614601, -67949305) Dec 13 14:27:30.190388 kernel: registered taskstats version 1 Dec 13 14:27:30.190400 kernel: Loading compiled-in X.509 certificates Dec 13 14:27:30.190410 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e1d88c9e01f5bb2adeb5b99325e46e5ca8dff115' Dec 13 14:27:30.190436 kernel: Key type .fscrypt registered Dec 13 14:27:30.190446 kernel: Key type fscrypt-provisioning registered Dec 13 14:27:30.190460 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 14:27:30.190469 kernel: ima: Allocated hash algorithm: sha1 Dec 13 14:27:30.190488 kernel: ima: No architecture policies found Dec 13 14:27:30.190504 kernel: clk: Disabling unused clocks Dec 13 14:27:30.190513 kernel: Freeing unused kernel image (initmem) memory: 47472K Dec 13 14:27:30.190522 kernel: Write protecting the kernel read-only data: 28672k Dec 13 14:27:30.190532 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 14:27:30.190556 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 14:27:30.190572 kernel: Run /init as init process Dec 13 14:27:30.190581 kernel: with arguments: Dec 13 14:27:30.190590 kernel: /init Dec 13 14:27:30.190615 kernel: with environment: Dec 13 14:27:30.190625 kernel: HOME=/ Dec 13 14:27:30.190634 kernel: TERM=linux Dec 13 14:27:30.190643 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 14:27:30.190675 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:27:30.190691 systemd[1]: Detected virtualization kvm. Dec 13 14:27:30.190702 systemd[1]: Detected architecture x86-64. Dec 13 14:27:30.190711 systemd[1]: Running in initrd. Dec 13 14:27:30.190721 systemd[1]: No hostname configured, using default hostname. Dec 13 14:27:30.190730 systemd[1]: Hostname set to . Dec 13 14:27:30.190741 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:27:30.190751 systemd[1]: Queued start job for default target initrd.target. Dec 13 14:27:30.190761 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:27:30.190770 systemd[1]: Reached target cryptsetup.target. Dec 13 14:27:30.190783 systemd[1]: Reached target paths.target. Dec 13 14:27:30.190807 systemd[1]: Reached target slices.target. Dec 13 14:27:30.190833 systemd[1]: Reached target swap.target. Dec 13 14:27:30.190844 systemd[1]: Reached target timers.target. Dec 13 14:27:30.190855 systemd[1]: Listening on iscsid.socket. Dec 13 14:27:30.190867 systemd[1]: Listening on iscsiuio.socket. Dec 13 14:27:30.190886 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 14:27:30.190897 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 14:27:30.190907 systemd[1]: Listening on systemd-journald.socket. Dec 13 14:27:30.190917 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:27:30.190927 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:27:30.190938 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:27:30.190950 systemd[1]: Reached target sockets.target. Dec 13 14:27:30.190960 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:27:30.190976 systemd[1]: Finished network-cleanup.service. Dec 13 14:27:30.190987 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 14:27:30.191003 systemd[1]: Starting systemd-journald.service... Dec 13 14:27:30.191012 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:27:30.191023 systemd[1]: Starting systemd-resolved.service... Dec 13 14:27:30.191033 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 14:27:30.191043 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:27:30.191053 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 14:27:30.191064 kernel: audit: type=1130 audit(1734100050.175:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:30.191091 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:27:30.191108 systemd-journald[197]: Journal started Dec 13 14:27:30.191165 systemd-journald[197]: Runtime Journal (/run/log/journal/fe22b6bec95d4e4391cf3fd30bd860e8) is 6.0M, max 48.5M, 42.5M free. Dec 13 14:27:30.175000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:30.178667 systemd-modules-load[198]: Inserted module 'overlay' Dec 13 14:27:30.219828 systemd[1]: Started systemd-journald.service. Dec 13 14:27:30.219858 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 14:27:30.219870 kernel: Bridge firewalling registered Dec 13 14:27:30.199279 systemd-resolved[199]: Positive Trust Anchors: Dec 13 14:27:30.199291 systemd-resolved[199]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:27:30.229196 kernel: audit: type=1130 audit(1734100050.221:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:30.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:30.233732 kernel: audit: type=1130 audit(1734100050.229:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:30.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:30.199321 systemd-resolved[199]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:27:30.243422 kernel: SCSI subsystem initialized Dec 13 14:27:30.243454 kernel: audit: type=1130 audit(1734100050.233:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:30.233000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:30.201831 systemd-resolved[199]: Defaulting to hostname 'linux'. Dec 13 14:27:30.248353 kernel: audit: type=1130 audit(1734100050.244:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:30.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:30.214977 systemd-modules-load[198]: Inserted module 'br_netfilter' Dec 13 14:27:30.225557 systemd[1]: Started systemd-resolved.service. Dec 13 14:27:30.229375 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 14:27:30.234144 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:27:30.244592 systemd[1]: Reached target nss-lookup.target. Dec 13 14:27:30.250576 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 14:27:30.258473 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 14:27:30.258519 kernel: device-mapper: uevent: version 1.0.3 Dec 13 14:27:30.258538 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 14:27:30.263081 systemd-modules-load[198]: Inserted module 'dm_multipath' Dec 13 14:27:30.264056 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:27:30.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:30.269111 kernel: audit: type=1130 audit(1734100050.264:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:30.269382 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:27:30.273330 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 14:27:30.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:30.276824 systemd[1]: Starting dracut-cmdline.service... Dec 13 14:27:30.280840 kernel: audit: type=1130 audit(1734100050.275:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:30.284713 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:27:30.284000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:30.290136 kernel: audit: type=1130 audit(1734100050.284:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:30.295184 dracut-cmdline[221]: dracut-dracut-053 Dec 13 14:27:30.297865 dracut-cmdline[221]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:27:30.372122 kernel: Loading iSCSI transport class v2.0-870. Dec 13 14:27:30.388110 kernel: iscsi: registered transport (tcp) Dec 13 14:27:30.412374 kernel: iscsi: registered transport (qla4xxx) Dec 13 14:27:30.412456 kernel: QLogic iSCSI HBA Driver Dec 13 14:27:30.441302 systemd[1]: Finished dracut-cmdline.service. Dec 13 14:27:30.446895 kernel: audit: type=1130 audit(1734100050.442:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:30.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:30.443179 systemd[1]: Starting dracut-pre-udev.service... Dec 13 14:27:30.490122 kernel: raid6: avx2x4 gen() 24150 MB/s Dec 13 14:27:30.507125 kernel: raid6: avx2x4 xor() 5950 MB/s Dec 13 14:27:30.524116 kernel: raid6: avx2x2 gen() 30054 MB/s Dec 13 14:27:30.541127 kernel: raid6: avx2x2 xor() 18563 MB/s Dec 13 14:27:30.558124 kernel: raid6: avx2x1 gen() 23015 MB/s Dec 13 14:27:30.575110 kernel: raid6: avx2x1 xor() 14694 MB/s Dec 13 14:27:30.596103 kernel: raid6: sse2x4 gen() 13485 MB/s Dec 13 14:27:30.613128 kernel: raid6: sse2x4 xor() 4713 MB/s Dec 13 14:27:30.660115 kernel: raid6: sse2x2 gen() 12960 MB/s Dec 13 14:27:30.677116 kernel: raid6: sse2x2 xor() 8488 MB/s Dec 13 14:27:30.694139 kernel: raid6: sse2x1 gen() 10647 MB/s Dec 13 14:27:30.711750 kernel: raid6: sse2x1 xor() 7482 MB/s Dec 13 14:27:30.711850 kernel: raid6: using algorithm avx2x2 gen() 30054 MB/s Dec 13 14:27:30.711861 kernel: raid6: .... xor() 18563 MB/s, rmw enabled Dec 13 14:27:30.712556 kernel: raid6: using avx2x2 recovery algorithm Dec 13 14:27:30.725104 kernel: xor: automatically using best checksumming function avx Dec 13 14:27:30.819105 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 14:27:30.828486 systemd[1]: Finished dracut-pre-udev.service. Dec 13 14:27:30.829000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:30.829000 audit: BPF prog-id=7 op=LOAD Dec 13 14:27:30.830000 audit: BPF prog-id=8 op=LOAD Dec 13 14:27:30.830574 systemd[1]: Starting systemd-udevd.service... Dec 13 14:27:30.844615 systemd-udevd[399]: Using default interface naming scheme 'v252'. Dec 13 14:27:30.849457 systemd[1]: Started systemd-udevd.service. Dec 13 14:27:30.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:30.852429 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 14:27:30.865569 dracut-pre-trigger[408]: rd.md=0: removing MD RAID activation Dec 13 14:27:30.892364 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 14:27:31.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:31.040721 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:27:31.077931 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:27:31.101000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:31.117263 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Dec 13 14:27:31.376068 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 14:27:31.376103 kernel: GPT:9289727 != 19775487 Dec 13 14:27:31.376114 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 14:27:31.376125 kernel: GPT:9289727 != 19775487 Dec 13 14:27:31.376140 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 14:27:31.376151 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 14:27:31.376162 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 14:27:31.376173 kernel: libata version 3.00 loaded. Dec 13 14:27:31.376183 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 14:27:31.376194 kernel: ahci 0000:00:1f.2: version 3.0 Dec 13 14:27:31.397204 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 Dec 13 14:27:31.397224 kernel: AES CTR mode by8 optimization enabled Dec 13 14:27:31.397233 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Dec 13 14:27:31.397354 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Dec 13 14:27:31.397438 kernel: scsi host0: ahci Dec 13 14:27:31.397539 kernel: scsi host1: ahci Dec 13 14:27:31.397630 kernel: scsi host2: ahci Dec 13 14:27:31.397731 kernel: scsi host3: ahci Dec 13 14:27:31.397845 kernel: scsi host4: ahci Dec 13 14:27:31.397944 kernel: scsi host5: ahci Dec 13 14:27:31.398041 kernel: ata1: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4100 irq 34 Dec 13 14:27:31.398051 kernel: ata2: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4180 irq 34 Dec 13 14:27:31.398060 kernel: ata3: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4200 irq 34 Dec 13 14:27:31.398069 kernel: ata4: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4280 irq 34 Dec 13 14:27:31.398092 kernel: ata5: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4300 irq 34 Dec 13 14:27:31.398101 kernel: ata6: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4380 irq 34 Dec 13 14:27:31.395378 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 14:27:31.531998 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (456) Dec 13 14:27:31.512856 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 14:27:31.540260 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 14:27:31.570601 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 14:27:31.577689 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:27:31.582057 systemd[1]: Starting disk-uuid.service... Dec 13 14:27:31.614903 disk-uuid[531]: Primary Header is updated. Dec 13 14:27:31.614903 disk-uuid[531]: Secondary Entries is updated. Dec 13 14:27:31.614903 disk-uuid[531]: Secondary Header is updated. Dec 13 14:27:31.620713 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 14:27:31.623112 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 14:27:31.627120 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 14:27:31.707114 kernel: ata4: SATA link down (SStatus 0 SControl 300) Dec 13 14:27:31.707200 kernel: ata6: SATA link down (SStatus 0 SControl 300) Dec 13 14:27:31.708104 kernel: ata2: SATA link down (SStatus 0 SControl 300) Dec 13 14:27:31.709128 kernel: ata5: SATA link down (SStatus 0 SControl 300) Dec 13 14:27:31.711094 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) Dec 13 14:27:31.714179 kernel: ata1: SATA link down (SStatus 0 SControl 300) Dec 13 14:27:31.714217 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Dec 13 14:27:31.716820 kernel: ata3.00: applying bridge limits Dec 13 14:27:31.719194 kernel: ata3.00: configured for UDMA/100 Dec 13 14:27:31.720117 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Dec 13 14:27:31.772309 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Dec 13 14:27:31.792612 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Dec 13 14:27:31.792658 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Dec 13 14:27:32.698115 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 14:27:32.698533 disk-uuid[532]: The operation has completed successfully. Dec 13 14:27:32.720802 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 14:27:32.721000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:32.721000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:32.720888 systemd[1]: Finished disk-uuid.service. Dec 13 14:27:32.728265 systemd[1]: Starting verity-setup.service... Dec 13 14:27:32.867102 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" Dec 13 14:27:32.891657 systemd[1]: Found device dev-mapper-usr.device. Dec 13 14:27:32.948880 systemd[1]: Mounting sysusr-usr.mount... Dec 13 14:27:32.951461 systemd[1]: Finished verity-setup.service. Dec 13 14:27:32.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:33.059106 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 14:27:33.059398 systemd[1]: Mounted sysusr-usr.mount. Dec 13 14:27:33.060594 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 14:27:33.061311 systemd[1]: Starting ignition-setup.service... Dec 13 14:27:33.062820 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 14:27:33.072265 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:27:33.072294 kernel: BTRFS info (device vda6): using free space tree Dec 13 14:27:33.072303 kernel: BTRFS info (device vda6): has skinny extents Dec 13 14:27:33.081566 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 14:27:33.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:33.131627 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 14:27:33.174000 audit: BPF prog-id=9 op=LOAD Dec 13 14:27:33.175283 systemd[1]: Starting systemd-networkd.service... Dec 13 14:27:33.203305 systemd-networkd[717]: lo: Link UP Dec 13 14:27:33.203316 systemd-networkd[717]: lo: Gained carrier Dec 13 14:27:33.205000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:33.203886 systemd-networkd[717]: Enumeration completed Dec 13 14:27:33.203969 systemd[1]: Started systemd-networkd.service. Dec 13 14:27:33.204159 systemd-networkd[717]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:27:33.206084 systemd[1]: Reached target network.target. Dec 13 14:27:33.206555 systemd-networkd[717]: eth0: Link UP Dec 13 14:27:33.206560 systemd-networkd[717]: eth0: Gained carrier Dec 13 14:27:33.208305 systemd[1]: Starting iscsiuio.service... Dec 13 14:27:33.270689 systemd[1]: Started iscsiuio.service. Dec 13 14:27:33.271000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:33.272653 systemd[1]: Starting iscsid.service... Dec 13 14:27:33.276184 systemd-networkd[717]: eth0: DHCPv4 address 10.0.0.112/16, gateway 10.0.0.1 acquired from 10.0.0.1 Dec 13 14:27:33.277682 iscsid[722]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:27:33.277682 iscsid[722]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 14:27:33.277682 iscsid[722]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 14:27:33.277682 iscsid[722]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 14:27:33.277682 iscsid[722]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:27:33.277682 iscsid[722]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 14:27:33.285000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:33.279211 systemd[1]: Started iscsid.service. Dec 13 14:27:33.285931 systemd[1]: Starting dracut-initqueue.service... Dec 13 14:27:33.298811 systemd[1]: Finished dracut-initqueue.service. Dec 13 14:27:33.299000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:33.299771 systemd[1]: Reached target remote-fs-pre.target. Dec 13 14:27:33.397757 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:27:33.397842 systemd[1]: Reached target remote-fs.target. Dec 13 14:27:33.398859 systemd[1]: Starting dracut-pre-mount.service... Dec 13 14:27:33.407482 systemd[1]: Finished dracut-pre-mount.service. Dec 13 14:27:33.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:33.867287 systemd[1]: Finished ignition-setup.service. Dec 13 14:27:33.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:33.922993 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 14:27:34.020485 ignition[737]: Ignition 2.14.0 Dec 13 14:27:34.020499 ignition[737]: Stage: fetch-offline Dec 13 14:27:34.020564 ignition[737]: no configs at "/usr/lib/ignition/base.d" Dec 13 14:27:34.020576 ignition[737]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 14:27:34.020715 ignition[737]: parsed url from cmdline: "" Dec 13 14:27:34.020720 ignition[737]: no config URL provided Dec 13 14:27:34.020727 ignition[737]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:27:34.020748 ignition[737]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:27:34.020771 ignition[737]: op(1): [started] loading QEMU firmware config module Dec 13 14:27:34.020777 ignition[737]: op(1): executing: "modprobe" "qemu_fw_cfg" Dec 13 14:27:34.026490 ignition[737]: op(1): [finished] loading QEMU firmware config module Dec 13 14:27:34.070756 ignition[737]: parsing config with SHA512: 16315266532000fe0bc1d5191197370f8a072b57bdcfd4ed8068b186e3c471f048ec813814ac36920eae2f9816c124d337e86ecb2c6d0efa7b951ed7018beef8 Dec 13 14:27:34.083301 unknown[737]: fetched base config from "system" Dec 13 14:27:34.083313 unknown[737]: fetched user config from "qemu" Dec 13 14:27:34.129582 ignition[737]: fetch-offline: fetch-offline passed Dec 13 14:27:34.129758 ignition[737]: Ignition finished successfully Dec 13 14:27:34.131990 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 14:27:34.131000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:34.132403 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Dec 13 14:27:34.133403 systemd[1]: Starting ignition-kargs.service... Dec 13 14:27:34.148327 ignition[745]: Ignition 2.14.0 Dec 13 14:27:34.148338 ignition[745]: Stage: kargs Dec 13 14:27:34.148453 ignition[745]: no configs at "/usr/lib/ignition/base.d" Dec 13 14:27:34.148463 ignition[745]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 14:27:34.241357 ignition[745]: kargs: kargs passed Dec 13 14:27:34.241423 ignition[745]: Ignition finished successfully Dec 13 14:27:34.244030 systemd[1]: Finished ignition-kargs.service. Dec 13 14:27:34.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:34.246554 kernel: kauditd_printk_skb: 18 callbacks suppressed Dec 13 14:27:34.246583 kernel: audit: type=1130 audit(1734100054.245:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:34.246887 systemd[1]: Starting ignition-disks.service... Dec 13 14:27:34.261928 ignition[751]: Ignition 2.14.0 Dec 13 14:27:34.261941 ignition[751]: Stage: disks Dec 13 14:27:34.262088 ignition[751]: no configs at "/usr/lib/ignition/base.d" Dec 13 14:27:34.262104 ignition[751]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 14:27:34.263603 ignition[751]: disks: disks passed Dec 13 14:27:34.361370 systemd[1]: Finished ignition-disks.service. Dec 13 14:27:34.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:34.263645 ignition[751]: Ignition finished successfully Dec 13 14:27:34.411958 kernel: audit: type=1130 audit(1734100054.362:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:34.362934 systemd[1]: Reached target initrd-root-device.target. Dec 13 14:27:34.411162 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:27:34.412967 systemd[1]: Reached target local-fs.target. Dec 13 14:27:34.414732 systemd[1]: Reached target sysinit.target. Dec 13 14:27:34.422113 systemd[1]: Reached target basic.target. Dec 13 14:27:34.423854 systemd[1]: Starting systemd-fsck-root.service... Dec 13 14:27:34.460458 systemd-fsck[759]: ROOT: clean, 621/553520 files, 56021/553472 blocks Dec 13 14:27:34.500208 systemd[1]: Finished systemd-fsck-root.service. Dec 13 14:27:34.507814 kernel: audit: type=1130 audit(1734100054.500:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:34.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:34.501538 systemd[1]: Mounting sysroot.mount... Dec 13 14:27:34.511098 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 14:27:34.511666 systemd[1]: Mounted sysroot.mount. Dec 13 14:27:34.513387 systemd[1]: Reached target initrd-root-fs.target. Dec 13 14:27:34.515202 systemd[1]: Mounting sysroot-usr.mount... Dec 13 14:27:34.516671 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 14:27:34.516773 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 14:27:34.516831 systemd[1]: Reached target ignition-diskful.target. Dec 13 14:27:34.519879 systemd[1]: Mounted sysroot-usr.mount. Dec 13 14:27:34.527287 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:27:34.529329 systemd[1]: Starting initrd-setup-root.service... Dec 13 14:27:34.537115 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (765) Dec 13 14:27:34.537399 initrd-setup-root[770]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 14:27:34.542352 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:27:34.542369 kernel: BTRFS info (device vda6): using free space tree Dec 13 14:27:34.542378 kernel: BTRFS info (device vda6): has skinny extents Dec 13 14:27:34.543009 initrd-setup-root[794]: cut: /sysroot/etc/group: No such file or directory Dec 13 14:27:34.544572 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:27:34.549861 initrd-setup-root[804]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 14:27:34.555488 initrd-setup-root[812]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 14:27:34.556278 systemd-networkd[717]: eth0: Gained IPv6LL Dec 13 14:27:34.603426 systemd[1]: Finished initrd-setup-root.service. Dec 13 14:27:34.608318 kernel: audit: type=1130 audit(1734100054.603:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:34.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:34.608270 systemd[1]: Starting ignition-mount.service... Dec 13 14:27:34.610814 systemd[1]: Starting sysroot-boot.service... Dec 13 14:27:34.618530 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 14:27:34.618652 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 14:27:34.631451 systemd[1]: Finished sysroot-boot.service. Dec 13 14:27:34.636329 kernel: audit: type=1130 audit(1734100054.632:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:34.632000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:34.636396 ignition[831]: INFO : Ignition 2.14.0 Dec 13 14:27:34.636396 ignition[831]: INFO : Stage: mount Dec 13 14:27:34.636396 ignition[831]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 14:27:34.636396 ignition[831]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 14:27:34.636396 ignition[831]: INFO : mount: mount passed Dec 13 14:27:34.636396 ignition[831]: INFO : Ignition finished successfully Dec 13 14:27:34.647180 kernel: audit: type=1130 audit(1734100054.637:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:34.637000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:34.635745 systemd[1]: Finished ignition-mount.service. Dec 13 14:27:34.638044 systemd[1]: Starting ignition-files.service... Dec 13 14:27:34.651336 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:27:34.661121 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (840) Dec 13 14:27:34.661176 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:27:34.662608 kernel: BTRFS info (device vda6): using free space tree Dec 13 14:27:34.662633 kernel: BTRFS info (device vda6): has skinny extents Dec 13 14:27:34.668639 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:27:34.715670 ignition[859]: INFO : Ignition 2.14.0 Dec 13 14:27:34.715670 ignition[859]: INFO : Stage: files Dec 13 14:27:34.718682 ignition[859]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 14:27:34.718682 ignition[859]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 14:27:34.718682 ignition[859]: DEBUG : files: compiled without relabeling support, skipping Dec 13 14:27:34.723431 ignition[859]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 14:27:34.723431 ignition[859]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 14:27:34.723431 ignition[859]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 14:27:34.723431 ignition[859]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 14:27:34.723431 ignition[859]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 14:27:34.723379 unknown[859]: wrote ssh authorized keys file for user: core Dec 13 14:27:34.733377 ignition[859]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 14:27:34.733377 ignition[859]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Dec 13 14:27:34.815838 ignition[859]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Dec 13 14:27:34.937336 ignition[859]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 14:27:34.937336 ignition[859]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Dec 13 14:27:34.941642 ignition[859]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 14:27:34.941642 ignition[859]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Dec 13 14:27:34.941642 ignition[859]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Dec 13 14:27:34.941642 ignition[859]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 14:27:34.941642 ignition[859]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 14:27:34.941642 ignition[859]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 14:27:34.941642 ignition[859]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 14:27:34.941642 ignition[859]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:27:34.941642 ignition[859]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:27:34.941642 ignition[859]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:27:34.941642 ignition[859]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:27:34.941642 ignition[859]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:27:34.941642 ignition[859]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.29.2-x86-64.raw: attempt #1 Dec 13 14:27:35.306669 ignition[859]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Dec 13 14:27:36.200361 ignition[859]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:27:36.200361 ignition[859]: INFO : files: op(b): [started] processing unit "prepare-helm.service" Dec 13 14:27:36.205373 ignition[859]: INFO : files: op(b): op(c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 14:27:36.205373 ignition[859]: INFO : files: op(b): op(c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 14:27:36.205373 ignition[859]: INFO : files: op(b): [finished] processing unit "prepare-helm.service" Dec 13 14:27:36.205373 ignition[859]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" Dec 13 14:27:36.205373 ignition[859]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 14:27:36.205373 ignition[859]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 14:27:36.205373 ignition[859]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" Dec 13 14:27:36.205373 ignition[859]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" Dec 13 14:27:36.205373 ignition[859]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" Dec 13 14:27:36.205373 ignition[859]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" Dec 13 14:27:36.205373 ignition[859]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 14:27:36.246394 ignition[859]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 14:27:36.248116 ignition[859]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" Dec 13 14:27:36.248116 ignition[859]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:27:36.248116 ignition[859]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:27:36.248116 ignition[859]: INFO : files: files passed Dec 13 14:27:36.248116 ignition[859]: INFO : Ignition finished successfully Dec 13 14:27:36.255245 systemd[1]: Finished ignition-files.service. Dec 13 14:27:36.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:36.256973 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 14:27:36.261950 kernel: audit: type=1130 audit(1734100056.256:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:36.260896 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 14:27:36.261738 systemd[1]: Starting ignition-quench.service... Dec 13 14:27:36.265970 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 14:27:36.267081 systemd[1]: Finished ignition-quench.service. Dec 13 14:27:36.268000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:36.269737 initrd-setup-root-after-ignition[884]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Dec 13 14:27:36.277536 kernel: audit: type=1130 audit(1734100056.268:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:36.277561 kernel: audit: type=1131 audit(1734100056.268:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:36.277572 kernel: audit: type=1130 audit(1734100056.277:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:36.268000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:36.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:36.277638 initrd-setup-root-after-ignition[886]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 14:27:36.272326 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 14:27:36.277625 systemd[1]: Reached target ignition-complete.target. Dec 13 14:27:36.281803 systemd[1]: Starting initrd-parse-etc.service... Dec 13 14:27:36.295784 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 14:27:36.295887 systemd[1]: Finished initrd-parse-etc.service. Dec 13 14:27:36.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:36.297000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:36.297948 systemd[1]: Reached target initrd-fs.target. Dec 13 14:27:36.299364 systemd[1]: Reached target initrd.target. Dec 13 14:27:36.300167 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 14:27:36.300935 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 14:27:36.311941 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 14:27:36.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:36.313616 systemd[1]: Starting initrd-cleanup.service... Dec 13 14:27:36.322660 systemd[1]: Stopped target nss-lookup.target. Dec 13 14:27:36.323569 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 14:27:36.325195 systemd[1]: Stopped target timers.target. Dec 13 14:27:36.326804 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 14:27:36.328000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:36.326895 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 14:27:36.328495 systemd[1]: Stopped target initrd.target. Dec 13 14:27:36.330177 systemd[1]: Stopped target basic.target. Dec 13 14:27:36.331733 systemd[1]: Stopped target ignition-complete.target. Dec 13 14:27:36.333311 systemd[1]: Stopped target ignition-diskful.target. Dec 13 14:27:36.334932 systemd[1]: Stopped target initrd-root-device.target. Dec 13 14:27:36.336893 systemd[1]: Stopped target remote-fs.target. Dec 13 14:27:36.338580 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 14:27:36.340262 systemd[1]: Stopped target sysinit.target. Dec 13 14:27:36.341824 systemd[1]: Stopped target local-fs.target. Dec 13 14:27:36.343587 systemd[1]: Stopped target local-fs-pre.target. Dec 13 14:27:36.345190 systemd[1]: Stopped target swap.target. Dec 13 14:27:36.348000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:36.346737 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 14:27:36.346837 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 14:27:36.351000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:36.348474 systemd[1]: Stopped target cryptsetup.target. Dec 13 14:27:36.353000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:36.349869 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 14:27:36.349958 systemd[1]: Stopped dracut-initqueue.service. Dec 13 14:27:36.351792 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 14:27:36.351886 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 14:27:36.353521 systemd[1]: Stopped target paths.target. Dec 13 14:27:36.355258 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 14:27:36.360142 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 14:27:36.361563 systemd[1]: Stopped target slices.target. Dec 13 14:27:36.363763 systemd[1]: Stopped target sockets.target. Dec 13 14:27:36.367000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:36.365781 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 14:27:36.369000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:36.365903 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 14:27:36.373661 iscsid[722]: iscsid shutting down. Dec 13 14:27:36.367819 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 14:27:36.367917 systemd[1]: Stopped ignition-files.service. Dec 13 14:27:36.378000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:36.370645 systemd[1]: Stopping ignition-mount.service... Dec 13 14:27:36.372013 systemd[1]: Stopping iscsid.service... Dec 13 14:27:36.374806 systemd[1]: Stopping sysroot-boot.service... Dec 13 14:27:36.375863 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 14:27:36.376015 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 14:27:36.379049 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 14:27:36.379179 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 14:27:36.381459 ignition[899]: INFO : Ignition 2.14.0 Dec 13 14:27:36.382032 ignition[899]: INFO : Stage: umount Dec 13 14:27:36.382032 ignition[899]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 14:27:36.382032 ignition[899]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 14:27:36.383206 ignition[899]: INFO : umount: umount passed Dec 13 14:27:36.383270 ignition[899]: INFO : Ignition finished successfully Dec 13 14:27:36.391000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:36.393738 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 14:27:36.395243 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 14:27:36.396190 systemd[1]: Stopped iscsid.service. Dec 13 14:27:36.397000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:36.398121 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 14:27:36.401692 systemd[1]: Stopped ignition-mount.service. Dec 13 14:27:36.403000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:36.403522 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 14:27:36.404431 systemd[1]: Closed iscsid.socket. Dec 13 14:27:36.405775 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 14:27:36.405811 systemd[1]: Stopped ignition-disks.service. Dec 13 14:27:36.408000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:36.408222 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 14:27:36.408254 systemd[1]: Stopped ignition-kargs.service. Dec 13 14:27:36.409000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:36.410644 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 14:27:36.410687 systemd[1]: Stopped ignition-setup.service. Dec 13 14:27:36.412000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:36.413104 systemd[1]: Stopping iscsiuio.service... Dec 13 14:27:36.414896 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 14:27:36.416049 systemd[1]: Finished initrd-cleanup.service. Dec 13 14:27:36.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:36.417000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:36.417896 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 14:27:36.418826 systemd[1]: Stopped iscsiuio.service. Dec 13 14:27:36.420000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:36.420897 systemd[1]: Stopped target network.target. Dec 13 14:27:36.422438 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 14:27:36.422470 systemd[1]: Closed iscsiuio.socket. Dec 13 14:27:36.424693 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:27:36.426426 systemd[1]: Stopping systemd-resolved.service... Dec 13 14:27:36.429112 systemd-networkd[717]: eth0: DHCPv6 lease lost Dec 13 14:27:36.430274 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:27:36.430358 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:27:36.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:36.432169 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 14:27:36.432193 systemd[1]: Closed systemd-networkd.socket. Dec 13 14:27:36.436000 audit: BPF prog-id=9 op=UNLOAD Dec 13 14:27:36.436256 systemd[1]: Stopping network-cleanup.service... Dec 13 14:27:36.437838 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 14:27:36.437882 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 14:27:36.440000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:36.440633 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 14:27:36.440669 systemd[1]: Stopped systemd-sysctl.service. Dec 13 14:27:36.442000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:36.443165 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 14:27:36.443215 systemd[1]: Stopped systemd-modules-load.service. Dec 13 14:27:36.445000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:36.445924 systemd[1]: Stopping systemd-udevd.service... Dec 13 14:27:36.448391 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 14:27:36.450135 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 14:27:36.451166 systemd[1]: Stopped systemd-resolved.service. Dec 13 14:27:36.452000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:36.454668 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 14:27:36.455000 audit: BPF prog-id=6 op=UNLOAD Dec 13 14:27:36.455764 systemd[1]: Stopped systemd-udevd.service. Dec 13 14:27:36.457000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:36.457868 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 14:27:36.458882 systemd[1]: Stopped network-cleanup.service. Dec 13 14:27:36.460000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:36.460615 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 14:27:36.460654 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 14:27:36.463229 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 14:27:36.463261 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 14:27:36.465825 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 14:27:36.465864 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 14:27:36.479000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:36.479315 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 14:27:36.479349 systemd[1]: Stopped dracut-cmdline.service. Dec 13 14:27:36.481000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:36.481133 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 14:27:36.481852 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 14:27:36.483000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:36.485199 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 14:27:36.486911 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 13 14:27:36.488000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:36.486961 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Dec 13 14:27:36.489104 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 14:27:36.489973 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 14:27:36.491000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:36.491823 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 14:27:36.492588 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 14:27:36.494000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:36.499064 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Dec 13 14:27:36.500860 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 14:27:36.501942 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 14:27:36.502000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:36.503000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:36.639234 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 14:27:36.639359 systemd[1]: Stopped sysroot-boot.service. Dec 13 14:27:36.642000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:36.642323 systemd[1]: Reached target initrd-switch-root.target. Dec 13 14:27:36.644269 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 14:27:36.645387 systemd[1]: Stopped initrd-setup-root.service. Dec 13 14:27:36.647000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:36.648030 systemd[1]: Starting initrd-switch-root.service... Dec 13 14:27:36.664713 systemd[1]: Switching root. Dec 13 14:27:36.683999 systemd-journald[197]: Journal stopped Dec 13 14:27:41.019703 systemd-journald[197]: Received SIGTERM from PID 1 (systemd). Dec 13 14:27:41.019765 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 14:27:41.019784 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 14:27:41.019795 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 14:27:41.019809 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 14:27:41.019819 kernel: SELinux: policy capability open_perms=1 Dec 13 14:27:41.019828 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 14:27:41.019838 kernel: SELinux: policy capability always_check_network=0 Dec 13 14:27:41.019847 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 14:27:41.019857 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 14:27:41.019866 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 14:27:41.019878 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 14:27:41.019888 systemd[1]: Successfully loaded SELinux policy in 41.477ms. Dec 13 14:27:41.019906 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 8.122ms. Dec 13 14:27:41.019921 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:27:41.019931 systemd[1]: Detected virtualization kvm. Dec 13 14:27:41.019941 systemd[1]: Detected architecture x86-64. Dec 13 14:27:41.019954 systemd[1]: Detected first boot. Dec 13 14:27:41.019965 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:27:41.019987 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 14:27:41.019998 systemd[1]: Populated /etc with preset unit settings. Dec 13 14:27:41.020008 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:27:41.020020 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:27:41.020033 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:27:41.020048 kernel: kauditd_printk_skb: 54 callbacks suppressed Dec 13 14:27:41.020058 kernel: audit: type=1334 audit(1734100060.846:86): prog-id=12 op=LOAD Dec 13 14:27:41.020079 kernel: audit: type=1334 audit(1734100060.846:87): prog-id=3 op=UNLOAD Dec 13 14:27:41.020090 kernel: audit: type=1334 audit(1734100060.859:88): prog-id=13 op=LOAD Dec 13 14:27:41.020100 kernel: audit: type=1334 audit(1734100060.860:89): prog-id=14 op=LOAD Dec 13 14:27:41.020109 kernel: audit: type=1334 audit(1734100060.860:90): prog-id=4 op=UNLOAD Dec 13 14:27:41.020119 kernel: audit: type=1334 audit(1734100060.860:91): prog-id=5 op=UNLOAD Dec 13 14:27:41.020129 kernel: audit: type=1334 audit(1734100060.861:92): prog-id=15 op=LOAD Dec 13 14:27:41.020140 kernel: audit: type=1334 audit(1734100060.861:93): prog-id=12 op=UNLOAD Dec 13 14:27:41.020150 kernel: audit: type=1334 audit(1734100060.864:94): prog-id=16 op=LOAD Dec 13 14:27:41.020160 kernel: audit: type=1334 audit(1734100060.866:95): prog-id=17 op=LOAD Dec 13 14:27:41.020170 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 14:27:41.020180 systemd[1]: Stopped initrd-switch-root.service. Dec 13 14:27:41.020190 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 14:27:41.020201 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 14:27:41.020211 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 14:27:41.020230 systemd[1]: Created slice system-getty.slice. Dec 13 14:27:41.020242 systemd[1]: Created slice system-modprobe.slice. Dec 13 14:27:41.020252 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 14:27:41.020262 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 14:27:41.020273 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 14:27:41.020283 systemd[1]: Created slice user.slice. Dec 13 14:27:41.020293 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:27:41.020303 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 14:27:41.020315 systemd[1]: Set up automount boot.automount. Dec 13 14:27:41.020325 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 14:27:41.020335 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 14:27:41.020345 systemd[1]: Stopped target initrd-fs.target. Dec 13 14:27:41.020356 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 14:27:41.020366 systemd[1]: Reached target integritysetup.target. Dec 13 14:27:41.020376 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:27:41.020386 systemd[1]: Reached target remote-fs.target. Dec 13 14:27:41.020396 systemd[1]: Reached target slices.target. Dec 13 14:27:41.020406 systemd[1]: Reached target swap.target. Dec 13 14:27:41.020417 systemd[1]: Reached target torcx.target. Dec 13 14:27:41.020428 systemd[1]: Reached target veritysetup.target. Dec 13 14:27:41.020441 systemd[1]: Listening on systemd-coredump.socket. Dec 13 14:27:41.020459 systemd[1]: Listening on systemd-initctl.socket. Dec 13 14:27:41.020469 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:27:41.020479 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:27:41.020490 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:27:41.020501 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 14:27:41.020510 systemd[1]: Mounting dev-hugepages.mount... Dec 13 14:27:41.020526 systemd[1]: Mounting dev-mqueue.mount... Dec 13 14:27:41.020537 systemd[1]: Mounting media.mount... Dec 13 14:27:41.020547 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:27:41.020557 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 14:27:41.020567 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 14:27:41.020584 systemd[1]: Mounting tmp.mount... Dec 13 14:27:41.020594 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 14:27:41.020608 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:27:41.020618 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:27:41.020631 systemd[1]: Starting modprobe@configfs.service... Dec 13 14:27:41.020641 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:27:41.020651 systemd[1]: Starting modprobe@drm.service... Dec 13 14:27:41.020661 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:27:41.020672 systemd[1]: Starting modprobe@fuse.service... Dec 13 14:27:41.020682 systemd[1]: Starting modprobe@loop.service... Dec 13 14:27:41.020701 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 14:27:41.020711 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 14:27:41.020721 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 14:27:41.020733 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 14:27:41.020743 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 14:27:41.020753 systemd[1]: Stopped systemd-journald.service. Dec 13 14:27:41.020763 systemd[1]: systemd-journald.service: Consumed 1.018s CPU time. Dec 13 14:27:41.020773 kernel: fuse: init (API version 7.34) Dec 13 14:27:41.020782 kernel: loop: module loaded Dec 13 14:27:41.020792 systemd[1]: Starting systemd-journald.service... Dec 13 14:27:41.020803 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:27:41.020813 systemd[1]: Starting systemd-network-generator.service... Dec 13 14:27:41.020828 systemd[1]: Starting systemd-remount-fs.service... Dec 13 14:27:41.020838 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:27:41.020848 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 14:27:41.020859 systemd[1]: Stopped verity-setup.service. Dec 13 14:27:41.020869 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:27:41.020883 systemd-journald[1013]: Journal started Dec 13 14:27:41.020925 systemd-journald[1013]: Runtime Journal (/run/log/journal/fe22b6bec95d4e4391cf3fd30bd860e8) is 6.0M, max 48.5M, 42.5M free. Dec 13 14:27:36.747000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 14:27:37.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:27:37.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:27:37.132000 audit: BPF prog-id=10 op=LOAD Dec 13 14:27:37.132000 audit: BPF prog-id=10 op=UNLOAD Dec 13 14:27:37.132000 audit: BPF prog-id=11 op=LOAD Dec 13 14:27:37.132000 audit: BPF prog-id=11 op=UNLOAD Dec 13 14:27:37.169000 audit[932]: AVC avc: denied { associate } for pid=932 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:27:37.169000 audit[932]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00018f8e2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=915 pid=932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:37.169000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:27:37.170000 audit[932]: AVC avc: denied { associate } for pid=932 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 14:27:37.170000 audit[932]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00018f9b9 a2=1ed a3=0 items=2 ppid=915 pid=932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:37.170000 audit: CWD cwd="/" Dec 13 14:27:37.170000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:37.170000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:37.170000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:27:40.846000 audit: BPF prog-id=12 op=LOAD Dec 13 14:27:40.846000 audit: BPF prog-id=3 op=UNLOAD Dec 13 14:27:40.859000 audit: BPF prog-id=13 op=LOAD Dec 13 14:27:40.860000 audit: BPF prog-id=14 op=LOAD Dec 13 14:27:40.860000 audit: BPF prog-id=4 op=UNLOAD Dec 13 14:27:40.860000 audit: BPF prog-id=5 op=UNLOAD Dec 13 14:27:40.861000 audit: BPF prog-id=15 op=LOAD Dec 13 14:27:40.861000 audit: BPF prog-id=12 op=UNLOAD Dec 13 14:27:40.864000 audit: BPF prog-id=16 op=LOAD Dec 13 14:27:40.866000 audit: BPF prog-id=17 op=LOAD Dec 13 14:27:40.866000 audit: BPF prog-id=13 op=UNLOAD Dec 13 14:27:40.866000 audit: BPF prog-id=14 op=UNLOAD Dec 13 14:27:40.867000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:40.876000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:40.876000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:40.885000 audit: BPF prog-id=15 op=UNLOAD Dec 13 14:27:40.991000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:40.994000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:40.996000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:40.996000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:40.999000 audit: BPF prog-id=18 op=LOAD Dec 13 14:27:40.999000 audit: BPF prog-id=19 op=LOAD Dec 13 14:27:40.999000 audit: BPF prog-id=20 op=LOAD Dec 13 14:27:40.999000 audit: BPF prog-id=16 op=UNLOAD Dec 13 14:27:40.999000 audit: BPF prog-id=17 op=UNLOAD Dec 13 14:27:41.018000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 14:27:41.018000 audit[1013]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffc0576cdd0 a2=4000 a3=7ffc0576ce6c items=0 ppid=1 pid=1013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:41.018000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 14:27:41.018000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:40.844141 systemd[1]: Queued start job for default target multi-user.target. Dec 13 14:27:37.167683 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-12-13T14:27:37Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:27:40.844153 systemd[1]: Unnecessary job was removed for dev-vda6.device. Dec 13 14:27:37.167945 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-12-13T14:27:37Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:27:40.866922 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 14:27:37.167966 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-12-13T14:27:37Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:27:40.867366 systemd[1]: systemd-journald.service: Consumed 1.018s CPU time. Dec 13 14:27:37.168002 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-12-13T14:27:37Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 14:27:37.168015 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-12-13T14:27:37Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 14:27:37.168051 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-12-13T14:27:37Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 14:27:37.168066 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-12-13T14:27:37Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 14:27:37.168330 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-12-13T14:27:37Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 14:27:37.168364 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-12-13T14:27:37Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:27:37.168375 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-12-13T14:27:37Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:27:37.168793 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-12-13T14:27:37Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 14:27:37.168823 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-12-13T14:27:37Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 14:27:37.168839 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-12-13T14:27:37Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 14:27:37.168852 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-12-13T14:27:37Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 14:27:37.168866 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-12-13T14:27:37Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 14:27:37.168879 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-12-13T14:27:37Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 14:27:40.538307 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-12-13T14:27:40Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:27:40.538621 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-12-13T14:27:40Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:27:40.538771 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-12-13T14:27:40Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:27:40.538968 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-12-13T14:27:40Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:27:40.539018 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-12-13T14:27:40Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 14:27:40.539101 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-12-13T14:27:40Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 14:27:41.024095 systemd[1]: Started systemd-journald.service. Dec 13 14:27:41.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:41.024674 systemd[1]: Mounted dev-hugepages.mount. Dec 13 14:27:41.025614 systemd[1]: Mounted dev-mqueue.mount. Dec 13 14:27:41.026521 systemd[1]: Mounted media.mount. Dec 13 14:27:41.027367 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 14:27:41.028346 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 14:27:41.029344 systemd[1]: Mounted tmp.mount. Dec 13 14:27:41.030301 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 14:27:41.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:41.031454 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:27:41.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:41.032664 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 14:27:41.032778 systemd[1]: Finished modprobe@configfs.service. Dec 13 14:27:41.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:41.033000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:41.034003 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:27:41.034128 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:27:41.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:41.035000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:41.035328 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:27:41.035439 systemd[1]: Finished modprobe@drm.service. Dec 13 14:27:41.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:41.036000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:41.036666 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:27:41.036824 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:27:41.037000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:41.037000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:41.038165 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 14:27:41.038322 systemd[1]: Finished modprobe@fuse.service. Dec 13 14:27:41.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:41.039000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:41.039585 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:27:41.039735 systemd[1]: Finished modprobe@loop.service. Dec 13 14:27:41.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:41.045000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:41.045947 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:27:41.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:41.047115 systemd[1]: Finished systemd-network-generator.service. Dec 13 14:27:41.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:41.048267 systemd[1]: Finished systemd-remount-fs.service. Dec 13 14:27:41.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:41.049554 systemd[1]: Reached target network-pre.target. Dec 13 14:27:41.051526 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 14:27:41.053618 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 14:27:41.054372 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 14:27:41.055879 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 14:27:41.057942 systemd[1]: Starting systemd-journal-flush.service... Dec 13 14:27:41.059184 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:27:41.060353 systemd[1]: Starting systemd-random-seed.service... Dec 13 14:27:41.061478 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:27:41.062614 systemd-journald[1013]: Time spent on flushing to /var/log/journal/fe22b6bec95d4e4391cf3fd30bd860e8 is 23.463ms for 1121 entries. Dec 13 14:27:41.062614 systemd-journald[1013]: System Journal (/var/log/journal/fe22b6bec95d4e4391cf3fd30bd860e8) is 8.0M, max 195.6M, 187.6M free. Dec 13 14:27:41.159295 systemd-journald[1013]: Received client request to flush runtime journal. Dec 13 14:27:41.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:41.144000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:41.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:41.104113 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:27:41.111088 systemd[1]: Starting systemd-sysusers.service... Dec 13 14:27:41.115423 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 14:27:41.116410 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 14:27:41.133826 systemd[1]: Finished systemd-random-seed.service. Dec 13 14:27:41.135093 systemd[1]: Reached target first-boot-complete.target. Dec 13 14:27:41.143351 systemd[1]: Finished systemd-sysusers.service. Dec 13 14:27:41.146035 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:27:41.151261 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:27:41.160459 systemd[1]: Finished systemd-journal-flush.service. Dec 13 14:27:41.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:41.162318 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:27:41.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:41.169298 systemd[1]: Starting systemd-udev-settle.service... Dec 13 14:27:41.175342 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:27:41.178000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:41.179992 udevadm[1039]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Dec 13 14:27:41.757325 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 14:27:41.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:41.759000 audit: BPF prog-id=21 op=LOAD Dec 13 14:27:41.759000 audit: BPF prog-id=22 op=LOAD Dec 13 14:27:41.759000 audit: BPF prog-id=7 op=UNLOAD Dec 13 14:27:41.759000 audit: BPF prog-id=8 op=UNLOAD Dec 13 14:27:41.760230 systemd[1]: Starting systemd-udevd.service... Dec 13 14:27:41.775771 systemd-udevd[1040]: Using default interface naming scheme 'v252'. Dec 13 14:27:41.790112 systemd[1]: Started systemd-udevd.service. Dec 13 14:27:41.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:41.791000 audit: BPF prog-id=23 op=LOAD Dec 13 14:27:41.792607 systemd[1]: Starting systemd-networkd.service... Dec 13 14:27:41.799000 audit: BPF prog-id=24 op=LOAD Dec 13 14:27:41.799000 audit: BPF prog-id=25 op=LOAD Dec 13 14:27:41.799000 audit: BPF prog-id=26 op=LOAD Dec 13 14:27:41.800011 systemd[1]: Starting systemd-userdbd.service... Dec 13 14:27:41.825509 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 14:27:41.837461 systemd[1]: Started systemd-userdbd.service. Dec 13 14:27:41.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:41.863118 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Dec 13 14:27:41.864428 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:27:41.881105 kernel: ACPI: button: Power Button [PWRF] Dec 13 14:27:41.900000 audit[1052]: AVC avc: denied { confidentiality } for pid=1052 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 14:27:41.900000 audit[1052]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5606db479d30 a1=337fc a2=7fba41fc4bc5 a3=5 items=110 ppid=1040 pid=1052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:41.900000 audit: CWD cwd="/" Dec 13 14:27:41.900000 audit: PATH item=0 name=(null) inode=44 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=1 name=(null) inode=14183 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=2 name=(null) inode=14183 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=3 name=(null) inode=14184 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=4 name=(null) inode=14183 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=5 name=(null) inode=14185 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=6 name=(null) inode=14183 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=7 name=(null) inode=14186 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=8 name=(null) inode=14186 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=9 name=(null) inode=14187 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=10 name=(null) inode=14186 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=11 name=(null) inode=14188 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=12 name=(null) inode=14186 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=13 name=(null) inode=14189 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=14 name=(null) inode=14186 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=15 name=(null) inode=14190 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=16 name=(null) inode=14186 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=17 name=(null) inode=14191 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=18 name=(null) inode=14183 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=19 name=(null) inode=14192 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=20 name=(null) inode=14192 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=21 name=(null) inode=14193 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=22 name=(null) inode=14192 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=23 name=(null) inode=14194 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=24 name=(null) inode=14192 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=25 name=(null) inode=14195 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=26 name=(null) inode=14192 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=27 name=(null) inode=14196 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=28 name=(null) inode=14192 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=29 name=(null) inode=14197 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=30 name=(null) inode=14183 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=31 name=(null) inode=14198 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=32 name=(null) inode=14198 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=33 name=(null) inode=14199 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=34 name=(null) inode=14198 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=35 name=(null) inode=14200 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=36 name=(null) inode=14198 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=37 name=(null) inode=14201 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=38 name=(null) inode=14198 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=39 name=(null) inode=14202 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=40 name=(null) inode=14198 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=41 name=(null) inode=14203 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=42 name=(null) inode=14183 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=43 name=(null) inode=14204 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=44 name=(null) inode=14204 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=45 name=(null) inode=14205 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=46 name=(null) inode=14204 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=47 name=(null) inode=14206 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=48 name=(null) inode=14204 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=49 name=(null) inode=14207 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=50 name=(null) inode=14204 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=51 name=(null) inode=14208 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=52 name=(null) inode=14204 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=53 name=(null) inode=14209 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=54 name=(null) inode=44 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=55 name=(null) inode=14210 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=56 name=(null) inode=14210 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=57 name=(null) inode=14211 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=58 name=(null) inode=14210 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=59 name=(null) inode=14212 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=60 name=(null) inode=14210 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=61 name=(null) inode=14213 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=62 name=(null) inode=14213 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=63 name=(null) inode=14214 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=64 name=(null) inode=14213 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=65 name=(null) inode=14215 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=66 name=(null) inode=14213 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=67 name=(null) inode=14216 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=68 name=(null) inode=14213 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=69 name=(null) inode=14217 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=70 name=(null) inode=14213 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=71 name=(null) inode=14218 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=72 name=(null) inode=14210 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=73 name=(null) inode=14219 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=74 name=(null) inode=14219 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=75 name=(null) inode=14220 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=76 name=(null) inode=14219 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=77 name=(null) inode=14221 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=78 name=(null) inode=14219 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=79 name=(null) inode=14222 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=80 name=(null) inode=14219 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=81 name=(null) inode=14223 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=82 name=(null) inode=14219 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=83 name=(null) inode=14224 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=84 name=(null) inode=14210 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=85 name=(null) inode=14225 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=86 name=(null) inode=14225 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=87 name=(null) inode=14226 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=88 name=(null) inode=14225 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=89 name=(null) inode=14227 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=90 name=(null) inode=14225 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=91 name=(null) inode=14228 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=92 name=(null) inode=14225 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=93 name=(null) inode=14229 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=94 name=(null) inode=14225 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=95 name=(null) inode=14230 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=96 name=(null) inode=14210 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=97 name=(null) inode=14231 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=98 name=(null) inode=14231 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=99 name=(null) inode=14232 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=100 name=(null) inode=14231 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=101 name=(null) inode=14233 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=102 name=(null) inode=14231 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=103 name=(null) inode=14234 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=104 name=(null) inode=14231 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=105 name=(null) inode=14235 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=106 name=(null) inode=14231 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=107 name=(null) inode=14236 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PATH item=109 name=(null) inode=14237 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:41.900000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 14:27:41.977654 systemd-networkd[1047]: lo: Link UP Dec 13 14:27:41.977668 systemd-networkd[1047]: lo: Gained carrier Dec 13 14:27:41.978110 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Dec 13 14:27:41.978372 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Dec 13 14:27:41.978604 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Dec 13 14:27:41.978129 systemd-networkd[1047]: Enumeration completed Dec 13 14:27:41.978281 systemd[1]: Started systemd-networkd.service. Dec 13 14:27:41.978409 systemd-networkd[1047]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:27:41.979802 systemd-networkd[1047]: eth0: Link UP Dec 13 14:27:41.979813 systemd-networkd[1047]: eth0: Gained carrier Dec 13 14:27:41.995088 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Dec 13 14:27:42.010000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:42.015238 systemd-networkd[1047]: eth0: DHCPv4 address 10.0.0.112/16, gateway 10.0.0.1 acquired from 10.0.0.1 Dec 13 14:27:42.016103 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 14:27:42.071259 kernel: kvm: Nested Virtualization enabled Dec 13 14:27:42.071373 kernel: SVM: kvm: Nested Paging enabled Dec 13 14:27:42.071390 kernel: SVM: Virtual VMLOAD VMSAVE supported Dec 13 14:27:42.072586 kernel: SVM: Virtual GIF supported Dec 13 14:27:42.095112 kernel: EDAC MC: Ver: 3.0.0 Dec 13 14:27:42.124596 systemd[1]: Finished systemd-udev-settle.service. Dec 13 14:27:42.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:42.127164 systemd[1]: Starting lvm2-activation-early.service... Dec 13 14:27:42.141272 lvm[1075]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:27:42.169537 systemd[1]: Finished lvm2-activation-early.service. Dec 13 14:27:42.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:42.170732 systemd[1]: Reached target cryptsetup.target. Dec 13 14:27:42.172869 systemd[1]: Starting lvm2-activation.service... Dec 13 14:27:42.177162 lvm[1076]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:27:42.204459 systemd[1]: Finished lvm2-activation.service. Dec 13 14:27:42.205000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:42.205654 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:27:42.206693 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 14:27:42.206722 systemd[1]: Reached target local-fs.target. Dec 13 14:27:42.207759 systemd[1]: Reached target machines.target. Dec 13 14:27:42.210506 systemd[1]: Starting ldconfig.service... Dec 13 14:27:42.211631 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:27:42.211699 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:27:42.212762 systemd[1]: Starting systemd-boot-update.service... Dec 13 14:27:42.215174 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 14:27:42.217761 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 14:27:42.222136 systemd[1]: Starting systemd-sysext.service... Dec 13 14:27:42.223624 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1078 (bootctl) Dec 13 14:27:42.225037 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 14:27:42.228882 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 14:27:42.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:42.243509 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 14:27:42.247984 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 14:27:42.248161 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 14:27:42.255696 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 14:27:42.256508 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 14:27:42.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:42.264127 kernel: loop0: detected capacity change from 0 to 211296 Dec 13 14:27:42.319110 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 14:27:42.340102 kernel: loop1: detected capacity change from 0 to 211296 Dec 13 14:27:42.344362 (sd-sysext)[1091]: Using extensions 'kubernetes'. Dec 13 14:27:42.345060 (sd-sysext)[1091]: Merged extensions into '/usr'. Dec 13 14:27:42.346157 systemd-fsck[1087]: fsck.fat 4.2 (2021-01-31) Dec 13 14:27:42.346157 systemd-fsck[1087]: /dev/vda1: 789 files, 119291/258078 clusters Dec 13 14:27:42.347173 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 14:27:42.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:42.351420 systemd[1]: Mounting boot.mount... Dec 13 14:27:42.367385 systemd[1]: Mounted boot.mount. Dec 13 14:27:42.368729 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:27:42.370717 systemd[1]: Mounting usr-share-oem.mount... Dec 13 14:27:42.371840 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:27:42.374856 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:27:42.377192 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:27:42.379589 systemd[1]: Starting modprobe@loop.service... Dec 13 14:27:42.380530 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:27:42.380663 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:27:42.380839 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:27:42.384023 systemd[1]: Mounted usr-share-oem.mount. Dec 13 14:27:42.385870 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:27:42.386061 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:27:42.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:42.387000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:42.387814 systemd[1]: Finished systemd-boot-update.service. Dec 13 14:27:42.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:42.389741 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:27:42.389877 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:27:42.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:42.391000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:42.391651 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:27:42.391785 systemd[1]: Finished modprobe@loop.service. Dec 13 14:27:42.392000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:42.392000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:42.394663 systemd[1]: Finished systemd-sysext.service. Dec 13 14:27:42.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:42.398449 systemd[1]: Starting ensure-sysext.service... Dec 13 14:27:42.399647 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:27:42.399708 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:27:42.400681 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 14:27:42.406114 systemd[1]: Reloading. Dec 13 14:27:42.412415 systemd-tmpfiles[1099]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 14:27:42.413311 systemd-tmpfiles[1099]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 14:27:42.415430 systemd-tmpfiles[1099]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 14:27:42.423837 ldconfig[1077]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 14:27:42.458822 /usr/lib/systemd/system-generators/torcx-generator[1118]: time="2024-12-13T14:27:42Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:27:42.459307 /usr/lib/systemd/system-generators/torcx-generator[1118]: time="2024-12-13T14:27:42Z" level=info msg="torcx already run" Dec 13 14:27:42.531012 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:27:42.531032 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:27:42.550046 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:27:42.606000 audit: BPF prog-id=27 op=LOAD Dec 13 14:27:42.606000 audit: BPF prog-id=23 op=UNLOAD Dec 13 14:27:42.607000 audit: BPF prog-id=28 op=LOAD Dec 13 14:27:42.607000 audit: BPF prog-id=18 op=UNLOAD Dec 13 14:27:42.607000 audit: BPF prog-id=29 op=LOAD Dec 13 14:27:42.607000 audit: BPF prog-id=30 op=LOAD Dec 13 14:27:42.607000 audit: BPF prog-id=19 op=UNLOAD Dec 13 14:27:42.607000 audit: BPF prog-id=20 op=UNLOAD Dec 13 14:27:42.608000 audit: BPF prog-id=31 op=LOAD Dec 13 14:27:42.608000 audit: BPF prog-id=24 op=UNLOAD Dec 13 14:27:42.608000 audit: BPF prog-id=32 op=LOAD Dec 13 14:27:42.608000 audit: BPF prog-id=33 op=LOAD Dec 13 14:27:42.608000 audit: BPF prog-id=25 op=UNLOAD Dec 13 14:27:42.608000 audit: BPF prog-id=26 op=UNLOAD Dec 13 14:27:42.609000 audit: BPF prog-id=34 op=LOAD Dec 13 14:27:42.609000 audit: BPF prog-id=35 op=LOAD Dec 13 14:27:42.609000 audit: BPF prog-id=21 op=UNLOAD Dec 13 14:27:42.609000 audit: BPF prog-id=22 op=UNLOAD Dec 13 14:27:42.612843 systemd[1]: Finished ldconfig.service. Dec 13 14:27:42.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:42.615346 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 14:27:42.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:42.619962 systemd[1]: Starting audit-rules.service... Dec 13 14:27:42.622247 systemd[1]: Starting clean-ca-certificates.service... Dec 13 14:27:42.624878 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 14:27:42.627000 audit: BPF prog-id=36 op=LOAD Dec 13 14:27:42.628574 systemd[1]: Starting systemd-resolved.service... Dec 13 14:27:42.630000 audit: BPF prog-id=37 op=LOAD Dec 13 14:27:42.632340 systemd[1]: Starting systemd-timesyncd.service... Dec 13 14:27:42.638008 systemd[1]: Starting systemd-update-utmp.service... Dec 13 14:27:42.639604 systemd[1]: Finished clean-ca-certificates.service. Dec 13 14:27:42.640000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:42.642769 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:27:42.644000 audit[1172]: SYSTEM_BOOT pid=1172 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 14:27:42.644470 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:27:42.645737 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:27:42.647744 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:27:42.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:42.653000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:42.649942 systemd[1]: Starting modprobe@loop.service... Dec 13 14:27:42.650944 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:27:42.654000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:42.654000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:42.656000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:42.656000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:42.651048 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:27:42.651210 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:27:42.652034 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:27:42.652164 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:27:42.653502 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:27:42.653611 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:27:42.655159 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:27:42.655264 systemd[1]: Finished modprobe@loop.service. Dec 13 14:27:42.658253 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:27:42.658424 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:27:42.659684 systemd[1]: Finished systemd-update-utmp.service. Dec 13 14:27:42.672000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:42.673261 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 14:27:42.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:42.675898 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:27:42.677385 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:27:42.679798 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:27:42.681749 systemd[1]: Starting modprobe@loop.service... Dec 13 14:27:42.682681 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:27:42.682807 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:27:42.684745 systemd[1]: Starting systemd-update-done.service... Dec 13 14:27:42.685680 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:27:42.686000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 14:27:42.686000 audit[1185]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc0c30b200 a2=420 a3=0 items=0 ppid=1160 pid=1185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:42.686000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 14:27:42.686512 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:27:42.687848 augenrules[1185]: No rules Dec 13 14:27:42.686629 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:27:42.688020 systemd[1]: Finished audit-rules.service. Dec 13 14:27:42.689281 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:27:42.689379 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:27:42.690809 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:27:42.690934 systemd[1]: Finished modprobe@loop.service. Dec 13 14:27:42.692340 systemd[1]: Finished systemd-update-done.service. Dec 13 14:27:42.693807 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:27:42.693961 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:27:42.697904 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:27:42.699525 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:27:42.704303 systemd[1]: Starting modprobe@drm.service... Dec 13 14:27:42.706497 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:27:42.708288 systemd-timesyncd[1170]: Contacted time server 10.0.0.1:123 (10.0.0.1). Dec 13 14:27:42.708338 systemd-timesyncd[1170]: Initial clock synchronization to Fri 2024-12-13 14:27:42.916595 UTC. Dec 13 14:27:42.708859 systemd[1]: Starting modprobe@loop.service... Dec 13 14:27:42.709923 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:27:42.710030 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:27:42.711448 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:27:42.712709 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:27:42.713869 systemd[1]: Started systemd-timesyncd.service. Dec 13 14:27:42.714421 systemd-resolved[1167]: Positive Trust Anchors: Dec 13 14:27:42.714430 systemd-resolved[1167]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:27:42.714456 systemd-resolved[1167]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:27:42.715969 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:27:42.716114 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:27:42.717723 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:27:42.717843 systemd[1]: Finished modprobe@drm.service. Dec 13 14:27:42.719320 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:27:42.719428 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:27:42.720653 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:27:42.720762 systemd[1]: Finished modprobe@loop.service. Dec 13 14:27:42.722354 systemd[1]: Reached target time-set.target. Dec 13 14:27:42.723484 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:27:42.723527 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:27:42.723854 systemd[1]: Finished ensure-sysext.service. Dec 13 14:27:42.725741 systemd-resolved[1167]: Defaulting to hostname 'linux'. Dec 13 14:27:42.727219 systemd[1]: Started systemd-resolved.service. Dec 13 14:27:42.728106 systemd[1]: Reached target network.target. Dec 13 14:27:42.728919 systemd[1]: Reached target nss-lookup.target. Dec 13 14:27:42.729756 systemd[1]: Reached target sysinit.target. Dec 13 14:27:42.730619 systemd[1]: Started motdgen.path. Dec 13 14:27:42.731336 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 14:27:42.732578 systemd[1]: Started logrotate.timer. Dec 13 14:27:42.733366 systemd[1]: Started mdadm.timer. Dec 13 14:27:42.734053 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 14:27:42.734911 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 14:27:42.734934 systemd[1]: Reached target paths.target. Dec 13 14:27:42.735690 systemd[1]: Reached target timers.target. Dec 13 14:27:42.736727 systemd[1]: Listening on dbus.socket. Dec 13 14:27:42.738562 systemd[1]: Starting docker.socket... Dec 13 14:27:42.741590 systemd[1]: Listening on sshd.socket. Dec 13 14:27:42.742426 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:27:42.742781 systemd[1]: Listening on docker.socket. Dec 13 14:27:42.743588 systemd[1]: Reached target sockets.target. Dec 13 14:27:42.744455 systemd[1]: Reached target basic.target. Dec 13 14:27:42.745343 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:27:42.745369 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:27:42.746435 systemd[1]: Starting containerd.service... Dec 13 14:27:42.748317 systemd[1]: Starting dbus.service... Dec 13 14:27:42.750115 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 14:27:42.755094 jq[1202]: false Dec 13 14:27:42.763216 extend-filesystems[1203]: Found loop1 Dec 13 14:27:42.764552 extend-filesystems[1203]: Found sr0 Dec 13 14:27:42.764552 extend-filesystems[1203]: Found vda Dec 13 14:27:42.764552 extend-filesystems[1203]: Found vda1 Dec 13 14:27:42.764552 extend-filesystems[1203]: Found vda2 Dec 13 14:27:42.764552 extend-filesystems[1203]: Found vda3 Dec 13 14:27:42.764552 extend-filesystems[1203]: Found usr Dec 13 14:27:42.764552 extend-filesystems[1203]: Found vda4 Dec 13 14:27:42.764552 extend-filesystems[1203]: Found vda6 Dec 13 14:27:42.764552 extend-filesystems[1203]: Found vda7 Dec 13 14:27:42.764552 extend-filesystems[1203]: Found vda9 Dec 13 14:27:42.764552 extend-filesystems[1203]: Checking size of /dev/vda9 Dec 13 14:27:42.771643 dbus-daemon[1201]: [system] SELinux support is enabled Dec 13 14:27:42.783775 extend-filesystems[1203]: Resized partition /dev/vda9 Dec 13 14:27:42.791831 systemd[1]: Starting extend-filesystems.service... Dec 13 14:27:42.796052 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 14:27:42.797597 systemd[1]: Starting motdgen.service... Dec 13 14:27:42.802666 systemd[1]: Starting prepare-helm.service... Dec 13 14:27:42.804641 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 14:27:42.807086 systemd[1]: Starting sshd-keygen.service... Dec 13 14:27:42.810387 systemd[1]: Starting systemd-logind.service... Dec 13 14:27:42.819151 extend-filesystems[1210]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 14:27:42.811308 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:27:42.811420 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 14:27:42.828459 jq[1225]: true Dec 13 14:27:42.811901 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 14:27:42.813489 systemd[1]: Starting update-engine.service... Dec 13 14:27:42.815523 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 14:27:42.817186 systemd[1]: Started dbus.service. Dec 13 14:27:42.829747 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 14:27:42.829948 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 14:27:42.830250 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 14:27:42.830381 systemd[1]: Finished motdgen.service. Dec 13 14:27:42.832037 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 14:27:42.832208 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 14:27:42.844299 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 14:27:42.844342 systemd[1]: Reached target system-config.target. Dec 13 14:27:42.845296 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 14:27:42.845335 systemd[1]: Reached target user-config.target. Dec 13 14:27:42.861305 jq[1230]: true Dec 13 14:27:42.865146 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Dec 13 14:27:42.886479 tar[1229]: linux-amd64/helm Dec 13 14:27:42.897451 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Dec 13 14:27:42.922361 extend-filesystems[1210]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Dec 13 14:27:42.922361 extend-filesystems[1210]: old_desc_blocks = 1, new_desc_blocks = 1 Dec 13 14:27:42.922361 extend-filesystems[1210]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Dec 13 14:27:42.940278 extend-filesystems[1203]: Resized filesystem in /dev/vda9 Dec 13 14:27:42.922546 systemd-logind[1219]: Watching system buttons on /dev/input/event1 (Power Button) Dec 13 14:27:42.922571 systemd-logind[1219]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 14:27:42.923898 systemd-logind[1219]: New seat seat0. Dec 13 14:27:42.924703 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 14:27:42.924917 systemd[1]: Finished extend-filesystems.service. Dec 13 14:27:42.936565 systemd[1]: Started systemd-logind.service. Dec 13 14:27:42.943050 update_engine[1223]: I1213 14:27:42.942776 1223 main.cc:92] Flatcar Update Engine starting Dec 13 14:27:42.946028 systemd[1]: Started update-engine.service. Dec 13 14:27:42.950391 update_engine[1223]: I1213 14:27:42.946064 1223 update_check_scheduler.cc:74] Next update check in 11m32s Dec 13 14:27:42.950549 systemd[1]: Started locksmithd.service. Dec 13 14:27:42.951413 bash[1252]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:27:42.952895 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 14:27:42.956564 env[1231]: time="2024-12-13T14:27:42.956483059Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 14:27:42.973298 env[1231]: time="2024-12-13T14:27:42.973238121Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 14:27:42.973464 env[1231]: time="2024-12-13T14:27:42.973434940Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:27:42.977117 env[1231]: time="2024-12-13T14:27:42.977048938Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:27:42.978369 env[1231]: time="2024-12-13T14:27:42.977209348Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:27:42.978369 env[1231]: time="2024-12-13T14:27:42.977512767Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:27:42.978369 env[1231]: time="2024-12-13T14:27:42.977547653Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 14:27:42.978369 env[1231]: time="2024-12-13T14:27:42.977565436Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 14:27:42.978369 env[1231]: time="2024-12-13T14:27:42.977578280Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 14:27:42.978369 env[1231]: time="2024-12-13T14:27:42.977664692Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:27:42.978369 env[1231]: time="2024-12-13T14:27:42.977978451Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:27:42.978369 env[1231]: time="2024-12-13T14:27:42.978149872Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:27:42.978369 env[1231]: time="2024-12-13T14:27:42.978169679Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 14:27:42.978369 env[1231]: time="2024-12-13T14:27:42.978224392Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 14:27:42.978369 env[1231]: time="2024-12-13T14:27:42.978240252Z" level=info msg="metadata content store policy set" policy=shared Dec 13 14:27:42.984807 env[1231]: time="2024-12-13T14:27:42.984145626Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 14:27:42.984807 env[1231]: time="2024-12-13T14:27:42.984178919Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 14:27:42.984807 env[1231]: time="2024-12-13T14:27:42.984196542Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 14:27:42.984807 env[1231]: time="2024-12-13T14:27:42.984254490Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 14:27:42.984807 env[1231]: time="2024-12-13T14:27:42.984272334Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 14:27:42.984807 env[1231]: time="2024-12-13T14:27:42.984289536Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 14:27:42.984807 env[1231]: time="2024-12-13T14:27:42.984305767Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 14:27:42.984807 env[1231]: time="2024-12-13T14:27:42.984323550Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 14:27:42.984807 env[1231]: time="2024-12-13T14:27:42.984339770Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 14:27:42.984807 env[1231]: time="2024-12-13T14:27:42.984358646Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 14:27:42.984807 env[1231]: time="2024-12-13T14:27:42.984374135Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 14:27:42.984807 env[1231]: time="2024-12-13T14:27:42.984389434Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 14:27:42.984807 env[1231]: time="2024-12-13T14:27:42.984489231Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 14:27:42.984807 env[1231]: time="2024-12-13T14:27:42.984599487Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 14:27:42.985207 env[1231]: time="2024-12-13T14:27:42.984938433Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 14:27:42.985207 env[1231]: time="2024-12-13T14:27:42.984975262Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 14:27:42.985207 env[1231]: time="2024-12-13T14:27:42.984988257Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 14:27:42.985207 env[1231]: time="2024-12-13T14:27:42.985049552Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 14:27:42.985207 env[1231]: time="2024-12-13T14:27:42.985060893Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 14:27:42.985207 env[1231]: time="2024-12-13T14:27:42.985086070Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 14:27:42.985207 env[1231]: time="2024-12-13T14:27:42.985099205Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 14:27:42.985207 env[1231]: time="2024-12-13T14:27:42.985110866Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 14:27:42.985207 env[1231]: time="2024-12-13T14:27:42.985122458Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 14:27:42.985207 env[1231]: time="2024-12-13T14:27:42.985133810Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 14:27:42.985207 env[1231]: time="2024-12-13T14:27:42.985144710Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 14:27:42.985207 env[1231]: time="2024-12-13T14:27:42.985182421Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 14:27:42.985501 env[1231]: time="2024-12-13T14:27:42.985405739Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 14:27:42.985501 env[1231]: time="2024-12-13T14:27:42.985425547Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 14:27:42.985501 env[1231]: time="2024-12-13T14:27:42.985436688Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 14:27:42.985501 env[1231]: time="2024-12-13T14:27:42.985447899Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 14:27:42.985501 env[1231]: time="2024-12-13T14:27:42.985461113Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 14:27:42.985501 env[1231]: time="2024-12-13T14:27:42.985482033Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 14:27:42.985664 env[1231]: time="2024-12-13T14:27:42.985506569Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 14:27:42.985664 env[1231]: time="2024-12-13T14:27:42.985558065Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 14:27:42.985820 env[1231]: time="2024-12-13T14:27:42.985767438Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 14:27:42.986495 env[1231]: time="2024-12-13T14:27:42.985826599Z" level=info msg="Connect containerd service" Dec 13 14:27:42.986495 env[1231]: time="2024-12-13T14:27:42.985867435Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 14:27:42.986577 env[1231]: time="2024-12-13T14:27:42.986550607Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:27:42.986843 env[1231]: time="2024-12-13T14:27:42.986799303Z" level=info msg="Start subscribing containerd event" Dec 13 14:27:42.986895 env[1231]: time="2024-12-13T14:27:42.986876578Z" level=info msg="Start recovering state" Dec 13 14:27:42.986986 env[1231]: time="2024-12-13T14:27:42.986961477Z" level=info msg="Start event monitor" Dec 13 14:27:42.986986 env[1231]: time="2024-12-13T14:27:42.986991223Z" level=info msg="Start snapshots syncer" Dec 13 14:27:42.987104 env[1231]: time="2024-12-13T14:27:42.987001943Z" level=info msg="Start cni network conf syncer for default" Dec 13 14:27:42.987104 env[1231]: time="2024-12-13T14:27:42.987008074Z" level=info msg="Start streaming server" Dec 13 14:27:42.987299 env[1231]: time="2024-12-13T14:27:42.987277219Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 14:27:42.987414 env[1231]: time="2024-12-13T14:27:42.987393938Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 14:27:42.987618 systemd[1]: Started containerd.service. Dec 13 14:27:42.989726 env[1231]: time="2024-12-13T14:27:42.989695524Z" level=info msg="containerd successfully booted in 0.033949s" Dec 13 14:27:43.033262 locksmithd[1255]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 14:27:43.248869 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:27:43.248940 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:27:43.260534 systemd-networkd[1047]: eth0: Gained IPv6LL Dec 13 14:27:43.262693 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:27:43.264733 systemd[1]: Reached target network-online.target. Dec 13 14:27:43.268268 systemd[1]: Starting kubelet.service... Dec 13 14:27:43.518904 tar[1229]: linux-amd64/LICENSE Dec 13 14:27:43.519049 tar[1229]: linux-amd64/README.md Dec 13 14:27:43.523545 systemd[1]: Finished prepare-helm.service. Dec 13 14:27:43.753571 sshd_keygen[1227]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 14:27:43.778201 systemd[1]: Finished sshd-keygen.service. Dec 13 14:27:43.781294 systemd[1]: Starting issuegen.service... Dec 13 14:27:43.787758 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 14:27:43.787911 systemd[1]: Finished issuegen.service. Dec 13 14:27:43.790559 systemd[1]: Starting systemd-user-sessions.service... Dec 13 14:27:43.797378 systemd[1]: Finished systemd-user-sessions.service. Dec 13 14:27:43.799961 systemd[1]: Started getty@tty1.service. Dec 13 14:27:43.802325 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 14:27:43.803553 systemd[1]: Reached target getty.target. Dec 13 14:27:44.113581 systemd[1]: Started kubelet.service. Dec 13 14:27:44.115062 systemd[1]: Reached target multi-user.target. Dec 13 14:27:44.117605 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 14:27:44.124306 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 14:27:44.124446 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 14:27:44.125638 systemd[1]: Startup finished in 975ms (kernel) + 6.696s (initrd) + 7.422s (userspace) = 15.094s. Dec 13 14:27:44.618309 kubelet[1283]: E1213 14:27:44.618229 1283 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:27:44.620035 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:27:44.620176 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:27:44.620405 systemd[1]: kubelet.service: Consumed 1.144s CPU time. Dec 13 14:27:45.253060 systemd[1]: Created slice system-sshd.slice. Dec 13 14:27:45.254266 systemd[1]: Started sshd@0-10.0.0.112:22-10.0.0.1:36008.service. Dec 13 14:27:45.291754 sshd[1293]: Accepted publickey for core from 10.0.0.1 port 36008 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:27:45.293828 sshd[1293]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:45.304279 systemd-logind[1219]: New session 1 of user core. Dec 13 14:27:45.305226 systemd[1]: Created slice user-500.slice. Dec 13 14:27:45.306583 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 14:27:45.315376 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 14:27:45.317047 systemd[1]: Starting user@500.service... Dec 13 14:27:45.319921 (systemd)[1296]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:45.405753 systemd[1296]: Queued start job for default target default.target. Dec 13 14:27:45.406274 systemd[1296]: Reached target paths.target. Dec 13 14:27:45.406292 systemd[1296]: Reached target sockets.target. Dec 13 14:27:45.406304 systemd[1296]: Reached target timers.target. Dec 13 14:27:45.406314 systemd[1296]: Reached target basic.target. Dec 13 14:27:45.406350 systemd[1296]: Reached target default.target. Dec 13 14:27:45.406371 systemd[1296]: Startup finished in 80ms. Dec 13 14:27:45.406464 systemd[1]: Started user@500.service. Dec 13 14:27:45.407940 systemd[1]: Started session-1.scope. Dec 13 14:27:45.461898 systemd[1]: Started sshd@1-10.0.0.112:22-10.0.0.1:36020.service. Dec 13 14:27:45.497165 sshd[1305]: Accepted publickey for core from 10.0.0.1 port 36020 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:27:45.498786 sshd[1305]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:45.504422 systemd-logind[1219]: New session 2 of user core. Dec 13 14:27:45.505677 systemd[1]: Started session-2.scope. Dec 13 14:27:45.563903 sshd[1305]: pam_unix(sshd:session): session closed for user core Dec 13 14:27:45.566631 systemd[1]: sshd@1-10.0.0.112:22-10.0.0.1:36020.service: Deactivated successfully. Dec 13 14:27:45.567201 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 14:27:45.567687 systemd-logind[1219]: Session 2 logged out. Waiting for processes to exit. Dec 13 14:27:45.568711 systemd[1]: Started sshd@2-10.0.0.112:22-10.0.0.1:36028.service. Dec 13 14:27:45.569420 systemd-logind[1219]: Removed session 2. Dec 13 14:27:45.602253 sshd[1311]: Accepted publickey for core from 10.0.0.1 port 36028 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:27:45.603677 sshd[1311]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:45.606976 systemd-logind[1219]: New session 3 of user core. Dec 13 14:27:45.607694 systemd[1]: Started session-3.scope. Dec 13 14:27:45.658322 sshd[1311]: pam_unix(sshd:session): session closed for user core Dec 13 14:27:45.661822 systemd[1]: sshd@2-10.0.0.112:22-10.0.0.1:36028.service: Deactivated successfully. Dec 13 14:27:45.662443 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 14:27:45.663147 systemd-logind[1219]: Session 3 logged out. Waiting for processes to exit. Dec 13 14:27:45.664394 systemd[1]: Started sshd@3-10.0.0.112:22-10.0.0.1:36032.service. Dec 13 14:27:45.665265 systemd-logind[1219]: Removed session 3. Dec 13 14:27:45.699767 sshd[1317]: Accepted publickey for core from 10.0.0.1 port 36032 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:27:45.701350 sshd[1317]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:45.707193 systemd-logind[1219]: New session 4 of user core. Dec 13 14:27:45.708160 systemd[1]: Started session-4.scope. Dec 13 14:27:45.764123 sshd[1317]: pam_unix(sshd:session): session closed for user core Dec 13 14:27:45.767242 systemd[1]: sshd@3-10.0.0.112:22-10.0.0.1:36032.service: Deactivated successfully. Dec 13 14:27:45.767761 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 14:27:45.768361 systemd-logind[1219]: Session 4 logged out. Waiting for processes to exit. Dec 13 14:27:45.769333 systemd[1]: Started sshd@4-10.0.0.112:22-10.0.0.1:36042.service. Dec 13 14:27:45.770146 systemd-logind[1219]: Removed session 4. Dec 13 14:27:45.802119 sshd[1323]: Accepted publickey for core from 10.0.0.1 port 36042 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:27:45.803336 sshd[1323]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:45.806613 systemd-logind[1219]: New session 5 of user core. Dec 13 14:27:45.807343 systemd[1]: Started session-5.scope. Dec 13 14:27:45.867066 sudo[1326]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 14:27:45.867301 sudo[1326]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:27:45.876395 dbus-daemon[1201]: \xd0\u001d\u007f\x90IV: received setenforce notice (enforcing=1531745664) Dec 13 14:27:45.878438 sudo[1326]: pam_unix(sudo:session): session closed for user root Dec 13 14:27:45.880630 sshd[1323]: pam_unix(sshd:session): session closed for user core Dec 13 14:27:45.883980 systemd[1]: sshd@4-10.0.0.112:22-10.0.0.1:36042.service: Deactivated successfully. Dec 13 14:27:45.884536 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 14:27:45.885108 systemd-logind[1219]: Session 5 logged out. Waiting for processes to exit. Dec 13 14:27:45.886267 systemd[1]: Started sshd@5-10.0.0.112:22-10.0.0.1:36056.service. Dec 13 14:27:45.888178 systemd-logind[1219]: Removed session 5. Dec 13 14:27:45.917658 sshd[1330]: Accepted publickey for core from 10.0.0.1 port 36056 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:27:45.919025 sshd[1330]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:45.922809 systemd-logind[1219]: New session 6 of user core. Dec 13 14:27:45.923574 systemd[1]: Started session-6.scope. Dec 13 14:27:45.981087 sudo[1334]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 14:27:45.981393 sudo[1334]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:27:45.984410 sudo[1334]: pam_unix(sudo:session): session closed for user root Dec 13 14:27:45.991262 sudo[1333]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 14:27:45.991478 sudo[1333]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:27:46.002027 systemd[1]: Stopping audit-rules.service... Dec 13 14:27:46.002000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:27:46.003508 auditctl[1337]: No rules Dec 13 14:27:46.003863 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 14:27:46.004082 systemd[1]: Stopped audit-rules.service. Dec 13 14:27:46.004565 kernel: kauditd_printk_skb: 218 callbacks suppressed Dec 13 14:27:46.004614 kernel: audit: type=1305 audit(1734100066.002:197): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:27:46.002000 audit[1337]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd90df66e0 a2=420 a3=0 items=0 ppid=1 pid=1337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:46.007839 systemd[1]: Starting audit-rules.service... Dec 13 14:27:46.013136 kernel: audit: type=1300 audit(1734100066.002:197): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd90df66e0 a2=420 a3=0 items=0 ppid=1 pid=1337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:46.013192 kernel: audit: type=1327 audit(1734100066.002:197): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:27:46.002000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:27:46.003000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:46.018254 kernel: audit: type=1131 audit(1734100066.003:198): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:46.025669 augenrules[1354]: No rules Dec 13 14:27:46.026434 systemd[1]: Finished audit-rules.service. Dec 13 14:27:46.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:46.027358 sudo[1333]: pam_unix(sudo:session): session closed for user root Dec 13 14:27:46.026000 audit[1333]: USER_END pid=1333 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:46.030336 sshd[1330]: pam_unix(sshd:session): session closed for user core Dec 13 14:27:46.033162 systemd[1]: sshd@5-10.0.0.112:22-10.0.0.1:36056.service: Deactivated successfully. Dec 13 14:27:46.033808 kernel: audit: type=1130 audit(1734100066.025:199): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:46.033863 kernel: audit: type=1106 audit(1734100066.026:200): pid=1333 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:46.033896 kernel: audit: type=1104 audit(1734100066.026:201): pid=1333 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:46.026000 audit[1333]: CRED_DISP pid=1333 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:46.033784 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 14:27:46.034479 systemd-logind[1219]: Session 6 logged out. Waiting for processes to exit. Dec 13 14:27:46.030000 audit[1330]: USER_END pid=1330 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:27:46.038105 systemd[1]: Started sshd@6-10.0.0.112:22-10.0.0.1:36058.service. Dec 13 14:27:46.038815 systemd-logind[1219]: Removed session 6. Dec 13 14:27:46.041444 kernel: audit: type=1106 audit(1734100066.030:202): pid=1330 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:27:46.041512 kernel: audit: type=1104 audit(1734100066.030:203): pid=1330 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:27:46.030000 audit[1330]: CRED_DISP pid=1330 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:27:46.032000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.112:22-10.0.0.1:36056 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:46.048553 kernel: audit: type=1131 audit(1734100066.032:204): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.112:22-10.0.0.1:36056 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:46.037000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.112:22-10.0.0.1:36058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:46.069000 audit[1360]: USER_ACCT pid=1360 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:27:46.071236 sshd[1360]: Accepted publickey for core from 10.0.0.1 port 36058 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:27:46.070000 audit[1360]: CRED_ACQ pid=1360 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:27:46.070000 audit[1360]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeec4a4360 a2=3 a3=0 items=0 ppid=1 pid=1360 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:46.070000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:27:46.072293 sshd[1360]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:46.075749 systemd-logind[1219]: New session 7 of user core. Dec 13 14:27:46.076635 systemd[1]: Started session-7.scope. Dec 13 14:27:46.080000 audit[1360]: USER_START pid=1360 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:27:46.081000 audit[1363]: CRED_ACQ pid=1363 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:27:46.131000 audit[1364]: USER_ACCT pid=1364 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:46.131000 audit[1364]: CRED_REFR pid=1364 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:46.132206 sudo[1364]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 14:27:46.132421 sudo[1364]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:27:46.133000 audit[1364]: USER_START pid=1364 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:46.162842 systemd[1]: Starting docker.service... Dec 13 14:27:46.272598 env[1376]: time="2024-12-13T14:27:46.272406417Z" level=info msg="Starting up" Dec 13 14:27:46.275048 env[1376]: time="2024-12-13T14:27:46.274983617Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 14:27:46.275048 env[1376]: time="2024-12-13T14:27:46.275024666Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 14:27:46.275256 env[1376]: time="2024-12-13T14:27:46.275062189Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 14:27:46.275256 env[1376]: time="2024-12-13T14:27:46.275077836Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 14:27:46.277671 env[1376]: time="2024-12-13T14:27:46.277629583Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 14:27:46.277671 env[1376]: time="2024-12-13T14:27:46.277661376Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 14:27:46.277747 env[1376]: time="2024-12-13T14:27:46.277690204Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 14:27:46.277747 env[1376]: time="2024-12-13T14:27:46.277708991Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 14:27:47.018783 env[1376]: time="2024-12-13T14:27:47.018712581Z" level=info msg="Loading containers: start." Dec 13 14:27:47.071000 audit[1410]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1410 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:47.071000 audit[1410]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7fff34b5bf10 a2=0 a3=7fff34b5befc items=0 ppid=1376 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:47.071000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Dec 13 14:27:47.072000 audit[1412]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1412 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:47.072000 audit[1412]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffc9f2825e0 a2=0 a3=7ffc9f2825cc items=0 ppid=1376 pid=1412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:47.072000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Dec 13 14:27:47.074000 audit[1414]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1414 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:47.074000 audit[1414]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffda11622c0 a2=0 a3=7ffda11622ac items=0 ppid=1376 pid=1414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:47.074000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 14:27:47.076000 audit[1416]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1416 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:47.076000 audit[1416]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffeb4151680 a2=0 a3=7ffeb415166c items=0 ppid=1376 pid=1416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:47.076000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 14:27:47.078000 audit[1418]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1418 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:47.078000 audit[1418]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcbea880d0 a2=0 a3=7ffcbea880bc items=0 ppid=1376 pid=1418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:47.078000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Dec 13 14:27:47.096000 audit[1423]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1423 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:47.096000 audit[1423]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc59454fb0 a2=0 a3=7ffc59454f9c items=0 ppid=1376 pid=1423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:47.096000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Dec 13 14:27:47.108000 audit[1425]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1425 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:47.108000 audit[1425]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc3b3bbb30 a2=0 a3=7ffc3b3bbb1c items=0 ppid=1376 pid=1425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:47.108000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Dec 13 14:27:47.109000 audit[1427]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1427 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:47.109000 audit[1427]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffc8c108130 a2=0 a3=7ffc8c10811c items=0 ppid=1376 pid=1427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:47.109000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Dec 13 14:27:47.110000 audit[1429]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1429 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:47.110000 audit[1429]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffeb08db8d0 a2=0 a3=7ffeb08db8bc items=0 ppid=1376 pid=1429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:47.110000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:27:47.121000 audit[1433]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1433 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:47.121000 audit[1433]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd791701e0 a2=0 a3=7ffd791701cc items=0 ppid=1376 pid=1433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:47.121000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:27:47.126000 audit[1434]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1434 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:47.126000 audit[1434]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc6dc3e6f0 a2=0 a3=7ffc6dc3e6dc items=0 ppid=1376 pid=1434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:47.126000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:27:47.137122 kernel: Initializing XFRM netlink socket Dec 13 14:27:47.166108 env[1376]: time="2024-12-13T14:27:47.166041059Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Dec 13 14:27:47.182000 audit[1442]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1442 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:47.182000 audit[1442]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffc8190c2f0 a2=0 a3=7ffc8190c2dc items=0 ppid=1376 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:47.182000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Dec 13 14:27:47.192000 audit[1445]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1445 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:47.192000 audit[1445]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7fff8c0d9b30 a2=0 a3=7fff8c0d9b1c items=0 ppid=1376 pid=1445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:47.192000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Dec 13 14:27:47.195000 audit[1448]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1448 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:47.195000 audit[1448]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff634d2380 a2=0 a3=7fff634d236c items=0 ppid=1376 pid=1448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:47.195000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Dec 13 14:27:47.196000 audit[1450]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1450 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:47.196000 audit[1450]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff033b9c90 a2=0 a3=7fff033b9c7c items=0 ppid=1376 pid=1450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:47.196000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Dec 13 14:27:47.198000 audit[1452]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1452 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:47.198000 audit[1452]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffe361d59a0 a2=0 a3=7ffe361d598c items=0 ppid=1376 pid=1452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:47.198000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Dec 13 14:27:47.200000 audit[1454]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1454 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:47.200000 audit[1454]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffe272ac1b0 a2=0 a3=7ffe272ac19c items=0 ppid=1376 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:47.200000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Dec 13 14:27:47.202000 audit[1456]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1456 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:47.202000 audit[1456]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fffc9316f90 a2=0 a3=7fffc9316f7c items=0 ppid=1376 pid=1456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:47.202000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Dec 13 14:27:47.209000 audit[1459]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1459 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:47.209000 audit[1459]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffea6172ce0 a2=0 a3=7ffea6172ccc items=0 ppid=1376 pid=1459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:47.209000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Dec 13 14:27:47.211000 audit[1461]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1461 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:47.211000 audit[1461]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffed385b6c0 a2=0 a3=7ffed385b6ac items=0 ppid=1376 pid=1461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:47.211000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 14:27:47.213000 audit[1463]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1463 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:47.213000 audit[1463]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffd951a6790 a2=0 a3=7ffd951a677c items=0 ppid=1376 pid=1463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:47.213000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 14:27:47.215000 audit[1465]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1465 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:47.215000 audit[1465]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc6bc5f220 a2=0 a3=7ffc6bc5f20c items=0 ppid=1376 pid=1465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:47.215000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Dec 13 14:27:47.217389 systemd-networkd[1047]: docker0: Link UP Dec 13 14:27:47.226000 audit[1469]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1469 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:47.226000 audit[1469]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd79576c60 a2=0 a3=7ffd79576c4c items=0 ppid=1376 pid=1469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:47.226000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:27:47.233000 audit[1470]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1470 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:27:47.233000 audit[1470]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd38693bb0 a2=0 a3=7ffd38693b9c items=0 ppid=1376 pid=1470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:47.233000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:27:47.234687 env[1376]: time="2024-12-13T14:27:47.234654501Z" level=info msg="Loading containers: done." Dec 13 14:27:47.255006 env[1376]: time="2024-12-13T14:27:47.254942998Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Dec 13 14:27:47.255245 env[1376]: time="2024-12-13T14:27:47.255181587Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Dec 13 14:27:47.255402 env[1376]: time="2024-12-13T14:27:47.255321357Z" level=info msg="Daemon has completed initialization" Dec 13 14:27:47.273330 systemd[1]: Started docker.service. Dec 13 14:27:47.272000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:47.283813 env[1376]: time="2024-12-13T14:27:47.283688997Z" level=info msg="API listen on /run/docker.sock" Dec 13 14:27:48.314377 env[1231]: time="2024-12-13T14:27:48.314190697Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.12\"" Dec 13 14:27:49.521391 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3123738857.mount: Deactivated successfully. Dec 13 14:27:51.475889 env[1231]: time="2024-12-13T14:27:51.475814362Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:51.543692 env[1231]: time="2024-12-13T14:27:51.543622010Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:92fbbe8caf9c923e0406b93c082b9e7af30032ace2d836c785633f90514bfefa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:51.573926 env[1231]: time="2024-12-13T14:27:51.573853635Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:51.620768 env[1231]: time="2024-12-13T14:27:51.620716662Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:2804b1e7b9e08f3a3468f8fd2f6487c55968b9293ee51b9efb865b3298acfa26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:51.621668 env[1231]: time="2024-12-13T14:27:51.621609259Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.12\" returns image reference \"sha256:92fbbe8caf9c923e0406b93c082b9e7af30032ace2d836c785633f90514bfefa\"" Dec 13 14:27:51.631852 env[1231]: time="2024-12-13T14:27:51.631800726Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.12\"" Dec 13 14:27:54.462276 env[1231]: time="2024-12-13T14:27:54.462173755Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:54.465525 env[1231]: time="2024-12-13T14:27:54.465483219Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f3b58a53109c96b6bf82adb5973fefa4baec46e2e9ee200be5cc03f3afbf127d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:54.467990 env[1231]: time="2024-12-13T14:27:54.467961469Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:54.469884 env[1231]: time="2024-12-13T14:27:54.469854159Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:e2f26a3f5ef3fd01f6330cab8b078cf303cfb6d36911a210d0915d535910e412,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:54.470725 env[1231]: time="2024-12-13T14:27:54.470669599Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.12\" returns image reference \"sha256:f3b58a53109c96b6bf82adb5973fefa4baec46e2e9ee200be5cc03f3afbf127d\"" Dec 13 14:27:54.510542 env[1231]: time="2024-12-13T14:27:54.510488793Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.12\"" Dec 13 14:27:54.871276 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 14:27:54.871000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:54.871561 systemd[1]: Stopped kubelet.service. Dec 13 14:27:54.871631 systemd[1]: kubelet.service: Consumed 1.144s CPU time. Dec 13 14:27:54.872937 kernel: kauditd_printk_skb: 84 callbacks suppressed Dec 13 14:27:54.873189 kernel: audit: type=1130 audit(1734100074.871:239): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:54.874001 systemd[1]: Starting kubelet.service... Dec 13 14:27:54.871000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:54.880827 kernel: audit: type=1131 audit(1734100074.871:240): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:54.997192 systemd[1]: Started kubelet.service. Dec 13 14:27:54.996000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:55.015100 kernel: audit: type=1130 audit(1734100074.996:241): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:55.194341 kubelet[1531]: E1213 14:27:55.194161 1531 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:27:55.197723 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:27:55.197862 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:27:55.197000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:27:55.202098 kernel: audit: type=1131 audit(1734100075.197:242): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:27:56.735014 env[1231]: time="2024-12-13T14:27:56.734931296Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:56.737440 env[1231]: time="2024-12-13T14:27:56.737366641Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6d3373aa79026111619cc6cc1ffff8b27006c56422e7c95724b03a61b530eaf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:56.741991 env[1231]: time="2024-12-13T14:27:56.741923330Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:56.744300 env[1231]: time="2024-12-13T14:27:56.744255299Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:ed66e2102f4705d45de7513decf3ac61879704984409323779d19e98b970568c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:56.745244 env[1231]: time="2024-12-13T14:27:56.745168497Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.12\" returns image reference \"sha256:e6d3373aa79026111619cc6cc1ffff8b27006c56422e7c95724b03a61b530eaf\"" Dec 13 14:27:56.771635 env[1231]: time="2024-12-13T14:27:56.771585062Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\"" Dec 13 14:27:58.136640 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1476825670.mount: Deactivated successfully. Dec 13 14:27:59.617008 env[1231]: time="2024-12-13T14:27:59.616920469Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:59.620346 env[1231]: time="2024-12-13T14:27:59.620300058Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:59.625341 env[1231]: time="2024-12-13T14:27:59.625203710Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:59.627584 env[1231]: time="2024-12-13T14:27:59.627512586Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:bc761494b78fa152a759457f42bc9b86ee9d18f5929bb127bd5f72f8e2112c39,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:59.628104 env[1231]: time="2024-12-13T14:27:59.628042964Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\" returns image reference \"sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153\"" Dec 13 14:27:59.642869 env[1231]: time="2024-12-13T14:27:59.642818418Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Dec 13 14:28:00.415827 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3113092730.mount: Deactivated successfully. Dec 13 14:28:02.280930 env[1231]: time="2024-12-13T14:28:02.280849912Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:02.324722 env[1231]: time="2024-12-13T14:28:02.324646040Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:02.333999 env[1231]: time="2024-12-13T14:28:02.333949198Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:02.353261 env[1231]: time="2024-12-13T14:28:02.353180779Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:02.354386 env[1231]: time="2024-12-13T14:28:02.354261695Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Dec 13 14:28:02.365461 env[1231]: time="2024-12-13T14:28:02.365416283Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Dec 13 14:28:02.908852 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount476938321.mount: Deactivated successfully. Dec 13 14:28:02.914766 env[1231]: time="2024-12-13T14:28:02.914721452Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:02.916504 env[1231]: time="2024-12-13T14:28:02.916465733Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:02.918134 env[1231]: time="2024-12-13T14:28:02.918111738Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:02.919595 env[1231]: time="2024-12-13T14:28:02.919548661Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:02.920031 env[1231]: time="2024-12-13T14:28:02.920000556Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Dec 13 14:28:02.929248 env[1231]: time="2024-12-13T14:28:02.929201050Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\"" Dec 13 14:28:03.732290 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3758703930.mount: Deactivated successfully. Dec 13 14:28:05.370998 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 14:28:05.371214 systemd[1]: Stopped kubelet.service. Dec 13 14:28:05.370000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:05.372740 systemd[1]: Starting kubelet.service... Dec 13 14:28:05.370000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:05.379481 kernel: audit: type=1130 audit(1734100085.370:243): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:05.379543 kernel: audit: type=1131 audit(1734100085.370:244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:05.455650 systemd[1]: Started kubelet.service. Dec 13 14:28:05.454000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:05.460107 kernel: audit: type=1130 audit(1734100085.454:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:05.516500 kubelet[1569]: E1213 14:28:05.516420 1569 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:28:05.518581 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:28:05.518737 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:28:05.517000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:28:05.523095 kernel: audit: type=1131 audit(1734100085.517:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:28:06.966830 env[1231]: time="2024-12-13T14:28:06.966741186Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:06.968842 env[1231]: time="2024-12-13T14:28:06.968777426Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a0eed15eed4498c145ef2f1883fcd300d7adbb759df73c901abd5383dda668e7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:06.970907 env[1231]: time="2024-12-13T14:28:06.970882258Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:06.973010 env[1231]: time="2024-12-13T14:28:06.972956565Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:22f892d7672adc0b9c86df67792afdb8b2dc08880f49f669eaaa59c47d7908c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:06.973794 env[1231]: time="2024-12-13T14:28:06.973749256Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\" returns image reference \"sha256:a0eed15eed4498c145ef2f1883fcd300d7adbb759df73c901abd5383dda668e7\"" Dec 13 14:28:09.099646 systemd[1]: Stopped kubelet.service. Dec 13 14:28:09.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:09.102223 systemd[1]: Starting kubelet.service... Dec 13 14:28:09.098000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:09.107529 kernel: audit: type=1130 audit(1734100089.098:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:09.107640 kernel: audit: type=1131 audit(1734100089.098:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:09.119981 systemd[1]: Reloading. Dec 13 14:28:09.185983 /usr/lib/systemd/system-generators/torcx-generator[1679]: time="2024-12-13T14:28:09Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:28:09.186488 /usr/lib/systemd/system-generators/torcx-generator[1679]: time="2024-12-13T14:28:09Z" level=info msg="torcx already run" Dec 13 14:28:09.417635 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:28:09.417653 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:28:09.434792 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:28:09.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.503242 kernel: audit: type=1400 audit(1734100089.495:249): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.503294 kernel: audit: type=1400 audit(1734100089.495:250): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.503320 kernel: audit: type=1400 audit(1734100089.495:251): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.506830 kernel: audit: type=1400 audit(1734100089.495:252): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.502000 audit: BPF prog-id=43 op=LOAD Dec 13 14:28:09.502000 audit: BPF prog-id=41 op=UNLOAD Dec 13 14:28:09.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.508000 audit: BPF prog-id=44 op=LOAD Dec 13 14:28:09.508000 audit: BPF prog-id=36 op=UNLOAD Dec 13 14:28:09.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.509000 audit: BPF prog-id=45 op=LOAD Dec 13 14:28:09.509000 audit: BPF prog-id=27 op=UNLOAD Dec 13 14:28:09.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.510000 audit: BPF prog-id=46 op=LOAD Dec 13 14:28:09.510000 audit: BPF prog-id=28 op=UNLOAD Dec 13 14:28:09.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.510000 audit: BPF prog-id=47 op=LOAD Dec 13 14:28:09.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.510000 audit: BPF prog-id=48 op=LOAD Dec 13 14:28:09.510000 audit: BPF prog-id=29 op=UNLOAD Dec 13 14:28:09.510000 audit: BPF prog-id=30 op=UNLOAD Dec 13 14:28:09.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.511000 audit: BPF prog-id=49 op=LOAD Dec 13 14:28:09.511000 audit: BPF prog-id=31 op=UNLOAD Dec 13 14:28:09.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.511000 audit: BPF prog-id=50 op=LOAD Dec 13 14:28:09.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.511000 audit: BPF prog-id=51 op=LOAD Dec 13 14:28:09.511000 audit: BPF prog-id=32 op=UNLOAD Dec 13 14:28:09.511000 audit: BPF prog-id=33 op=UNLOAD Dec 13 14:28:09.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.512000 audit: BPF prog-id=52 op=LOAD Dec 13 14:28:09.512000 audit: BPF prog-id=37 op=UNLOAD Dec 13 14:28:09.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.513000 audit: BPF prog-id=53 op=LOAD Dec 13 14:28:09.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.513000 audit: BPF prog-id=54 op=LOAD Dec 13 14:28:09.513000 audit: BPF prog-id=34 op=UNLOAD Dec 13 14:28:09.513000 audit: BPF prog-id=35 op=UNLOAD Dec 13 14:28:09.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.515000 audit: BPF prog-id=55 op=LOAD Dec 13 14:28:09.515000 audit: BPF prog-id=38 op=UNLOAD Dec 13 14:28:09.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.515000 audit: BPF prog-id=56 op=LOAD Dec 13 14:28:09.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:09.515000 audit: BPF prog-id=57 op=LOAD Dec 13 14:28:09.515000 audit: BPF prog-id=39 op=UNLOAD Dec 13 14:28:09.515000 audit: BPF prog-id=40 op=UNLOAD Dec 13 14:28:09.527818 systemd[1]: Started kubelet.service. Dec 13 14:28:09.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:09.529711 systemd[1]: Stopping kubelet.service... Dec 13 14:28:09.530150 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:28:09.530365 systemd[1]: Stopped kubelet.service. Dec 13 14:28:09.529000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:09.531883 systemd[1]: Starting kubelet.service... Dec 13 14:28:09.614368 systemd[1]: Started kubelet.service. Dec 13 14:28:09.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:09.654127 kubelet[1727]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:28:09.654127 kubelet[1727]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:28:09.654127 kubelet[1727]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:28:09.654545 kubelet[1727]: I1213 14:28:09.654198 1727 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:28:10.039098 kubelet[1727]: I1213 14:28:10.039033 1727 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 14:28:10.039098 kubelet[1727]: I1213 14:28:10.039067 1727 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:28:10.039287 kubelet[1727]: I1213 14:28:10.039283 1727 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 14:28:10.069737 kubelet[1727]: I1213 14:28:10.069686 1727 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:28:10.070194 kubelet[1727]: E1213 14:28:10.070159 1727 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.0.0.112:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.0.0.112:6443: connect: connection refused Dec 13 14:28:10.079040 kubelet[1727]: I1213 14:28:10.078988 1727 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:28:10.080632 kubelet[1727]: I1213 14:28:10.080611 1727 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:28:10.081031 kubelet[1727]: I1213 14:28:10.080992 1727 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 14:28:10.081181 kubelet[1727]: I1213 14:28:10.081044 1727 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:28:10.081181 kubelet[1727]: I1213 14:28:10.081058 1727 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 14:28:10.081278 kubelet[1727]: I1213 14:28:10.081260 1727 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:28:10.081395 kubelet[1727]: I1213 14:28:10.081380 1727 kubelet.go:396] "Attempting to sync node with API server" Dec 13 14:28:10.081419 kubelet[1727]: I1213 14:28:10.081403 1727 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:28:10.081441 kubelet[1727]: I1213 14:28:10.081432 1727 kubelet.go:312] "Adding apiserver pod source" Dec 13 14:28:10.081463 kubelet[1727]: I1213 14:28:10.081448 1727 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:28:10.081958 kubelet[1727]: W1213 14:28:10.081909 1727 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://10.0.0.112:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.112:6443: connect: connection refused Dec 13 14:28:10.082094 kubelet[1727]: E1213 14:28:10.082062 1727 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.112:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.112:6443: connect: connection refused Dec 13 14:28:10.082339 kubelet[1727]: W1213 14:28:10.082225 1727 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://10.0.0.112:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.112:6443: connect: connection refused Dec 13 14:28:10.082339 kubelet[1727]: E1213 14:28:10.082270 1727 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.112:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.112:6443: connect: connection refused Dec 13 14:28:10.082873 kubelet[1727]: I1213 14:28:10.082845 1727 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:28:10.091529 kubelet[1727]: I1213 14:28:10.091485 1727 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:28:10.092860 kubelet[1727]: W1213 14:28:10.092500 1727 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 14:28:10.093152 kubelet[1727]: I1213 14:28:10.093124 1727 server.go:1256] "Started kubelet" Dec 13 14:28:10.093580 kubelet[1727]: I1213 14:28:10.093564 1727 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:28:10.093831 kubelet[1727]: I1213 14:28:10.093599 1727 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:28:10.094047 kubelet[1727]: I1213 14:28:10.094011 1727 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:28:10.093000 audit[1727]: AVC avc: denied { mac_admin } for pid=1727 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:10.093000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:28:10.093000 audit[1727]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009830e0 a1=c00091cdc8 a2=c0009830b0 a3=25 items=0 ppid=1 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:10.093000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:28:10.093000 audit[1727]: AVC avc: denied { mac_admin } for pid=1727 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:10.093000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:28:10.093000 audit[1727]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b746e0 a1=c00091cde0 a2=c000983170 a3=25 items=0 ppid=1 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:10.093000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:28:10.094611 kubelet[1727]: I1213 14:28:10.094255 1727 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:28:10.094611 kubelet[1727]: I1213 14:28:10.094291 1727 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:28:10.094611 kubelet[1727]: I1213 14:28:10.094359 1727 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:28:10.094692 kubelet[1727]: I1213 14:28:10.094678 1727 server.go:461] "Adding debug handlers to kubelet server" Dec 13 14:28:10.095000 audit[1739]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1739 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:10.095000 audit[1739]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc8f319000 a2=0 a3=7ffc8f318fec items=0 ppid=1727 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:10.095000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:28:10.096000 audit[1740]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1740 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:10.096000 audit[1740]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff0a5bf5b0 a2=0 a3=7fff0a5bf59c items=0 ppid=1727 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:10.096000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:28:10.100259 kubelet[1727]: I1213 14:28:10.100227 1727 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 14:28:10.100000 audit[1742]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1742 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:10.100000 audit[1742]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdac100eb0 a2=0 a3=7ffdac100e9c items=0 ppid=1727 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:10.100000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:28:10.102323 kubelet[1727]: I1213 14:28:10.102300 1727 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 14:28:10.102360 kubelet[1727]: I1213 14:28:10.102354 1727 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 14:28:10.102000 audit[1744]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1744 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:10.102000 audit[1744]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc8a7b81f0 a2=0 a3=7ffc8a7b81dc items=0 ppid=1727 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:10.102000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:28:10.108000 audit[1747]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1747 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:10.108000 audit[1747]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff10a2cff0 a2=0 a3=7fff10a2cfdc items=0 ppid=1727 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:10.108000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 14:28:10.109654 kubelet[1727]: I1213 14:28:10.109572 1727 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:28:10.109000 audit[1749]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1749 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:10.109000 audit[1749]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdcae22180 a2=0 a3=7ffdcae2216c items=0 ppid=1727 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:10.109000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:28:10.110571 kubelet[1727]: I1213 14:28:10.110446 1727 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:28:10.110571 kubelet[1727]: I1213 14:28:10.110468 1727 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:28:10.110571 kubelet[1727]: I1213 14:28:10.110482 1727 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 14:28:10.110571 kubelet[1727]: E1213 14:28:10.110522 1727 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 14:28:10.110000 audit[1750]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1750 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:10.110000 audit[1750]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc742d7830 a2=0 a3=7ffc742d781c items=0 ppid=1727 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:10.110000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:28:10.111000 audit[1751]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1751 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:10.111000 audit[1751]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd582d9810 a2=0 a3=7ffd582d97fc items=0 ppid=1727 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:10.111000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:28:10.112000 audit[1752]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1752 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:10.112000 audit[1752]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffda14ddf10 a2=0 a3=7ffda14ddefc items=0 ppid=1727 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:10.112000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:28:10.113000 audit[1753]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1753 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:10.113000 audit[1753]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff90179e00 a2=0 a3=7fff90179dec items=0 ppid=1727 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:10.113000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:28:10.114000 audit[1754]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1754 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:10.114000 audit[1754]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc37eba500 a2=0 a3=7ffc37eba4ec items=0 ppid=1727 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:10.114000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:28:10.114000 audit[1755]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1755 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:10.114000 audit[1755]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdae8a5150 a2=0 a3=7ffdae8a513c items=0 ppid=1727 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:10.114000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:28:10.116644 kubelet[1727]: E1213 14:28:10.116617 1727 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.112:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.112:6443: connect: connection refused" interval="200ms" Dec 13 14:28:10.116712 kubelet[1727]: W1213 14:28:10.116672 1727 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://10.0.0.112:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.112:6443: connect: connection refused Dec 13 14:28:10.116712 kubelet[1727]: E1213 14:28:10.116706 1727 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.112:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.112:6443: connect: connection refused Dec 13 14:28:10.116793 kubelet[1727]: W1213 14:28:10.116753 1727 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://10.0.0.112:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.112:6443: connect: connection refused Dec 13 14:28:10.116793 kubelet[1727]: E1213 14:28:10.116779 1727 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.112:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.112:6443: connect: connection refused Dec 13 14:28:10.120146 kubelet[1727]: E1213 14:28:10.120121 1727 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:28:10.120850 kubelet[1727]: I1213 14:28:10.120815 1727 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:28:10.124051 kubelet[1727]: I1213 14:28:10.124018 1727 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:28:10.124051 kubelet[1727]: I1213 14:28:10.124046 1727 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:28:10.134770 kubelet[1727]: I1213 14:28:10.134738 1727 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:28:10.134770 kubelet[1727]: I1213 14:28:10.134760 1727 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:28:10.134949 kubelet[1727]: I1213 14:28:10.134794 1727 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:28:10.202550 kubelet[1727]: I1213 14:28:10.202508 1727 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 14:28:10.203266 kubelet[1727]: E1213 14:28:10.203239 1727 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.112:6443/api/v1/nodes\": dial tcp 10.0.0.112:6443: connect: connection refused" node="localhost" Dec 13 14:28:10.211377 kubelet[1727]: E1213 14:28:10.211347 1727 kubelet.go:2353] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Dec 13 14:28:10.317532 kubelet[1727]: E1213 14:28:10.317401 1727 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.112:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.112:6443: connect: connection refused" interval="400ms" Dec 13 14:28:10.405017 kubelet[1727]: I1213 14:28:10.404962 1727 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 14:28:10.405524 kubelet[1727]: E1213 14:28:10.405466 1727 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.112:6443/api/v1/nodes\": dial tcp 10.0.0.112:6443: connect: connection refused" node="localhost" Dec 13 14:28:10.411497 kubelet[1727]: E1213 14:28:10.411461 1727 kubelet.go:2353] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Dec 13 14:28:10.453801 kubelet[1727]: E1213 14:28:10.453750 1727 event.go:355] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.112:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.112:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.1810c2d822f8d006 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2024-12-13 14:28:10.093096966 +0000 UTC m=+0.475138452,LastTimestamp:2024-12-13 14:28:10.093096966 +0000 UTC m=+0.475138452,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" Dec 13 14:28:10.470025 kubelet[1727]: I1213 14:28:10.469954 1727 policy_none.go:49] "None policy: Start" Dec 13 14:28:10.470891 kubelet[1727]: I1213 14:28:10.470859 1727 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:28:10.470891 kubelet[1727]: I1213 14:28:10.470896 1727 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:28:10.496163 systemd[1]: Created slice kubepods.slice. Dec 13 14:28:10.500419 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 14:28:10.503048 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 14:28:10.515301 kubelet[1727]: I1213 14:28:10.515249 1727 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:28:10.514000 audit[1727]: AVC avc: denied { mac_admin } for pid=1727 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:10.516212 kernel: kauditd_printk_skb: 215 callbacks suppressed Dec 13 14:28:10.516335 kernel: audit: type=1400 audit(1734100090.514:438): avc: denied { mac_admin } for pid=1727 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:10.516518 kubelet[1727]: I1213 14:28:10.516468 1727 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:28:10.516721 kubelet[1727]: I1213 14:28:10.516691 1727 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:28:10.518453 kubelet[1727]: E1213 14:28:10.518426 1727 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" Dec 13 14:28:10.514000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:28:10.520853 kernel: audit: type=1401 audit(1734100090.514:438): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:28:10.520903 kernel: audit: type=1300 audit(1734100090.514:438): arch=c000003e syscall=188 success=no exit=-22 a0=c000c4f680 a1=c00101fe30 a2=c000c4f650 a3=25 items=0 ppid=1 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:10.514000 audit[1727]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c4f680 a1=c00101fe30 a2=c000c4f650 a3=25 items=0 ppid=1 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:10.525262 kernel: audit: type=1327 audit(1734100090.514:438): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:28:10.514000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:28:10.718466 kubelet[1727]: E1213 14:28:10.718398 1727 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.112:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.112:6443: connect: connection refused" interval="800ms" Dec 13 14:28:10.806948 kubelet[1727]: I1213 14:28:10.806901 1727 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 14:28:10.807412 kubelet[1727]: E1213 14:28:10.807377 1727 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.112:6443/api/v1/nodes\": dial tcp 10.0.0.112:6443: connect: connection refused" node="localhost" Dec 13 14:28:10.812544 kubelet[1727]: I1213 14:28:10.812485 1727 topology_manager.go:215] "Topology Admit Handler" podUID="5a9964cdd2dc69b244152cc00e050bf4" podNamespace="kube-system" podName="kube-apiserver-localhost" Dec 13 14:28:10.813847 kubelet[1727]: I1213 14:28:10.813819 1727 topology_manager.go:215] "Topology Admit Handler" podUID="4f8e0d694c07e04969646aa3c152c34a" podNamespace="kube-system" podName="kube-controller-manager-localhost" Dec 13 14:28:10.815428 kubelet[1727]: I1213 14:28:10.815395 1727 topology_manager.go:215] "Topology Admit Handler" podUID="c4144e8f85b2123a6afada0c1705bbba" podNamespace="kube-system" podName="kube-scheduler-localhost" Dec 13 14:28:10.821034 systemd[1]: Created slice kubepods-burstable-pod5a9964cdd2dc69b244152cc00e050bf4.slice. Dec 13 14:28:10.829536 systemd[1]: Created slice kubepods-burstable-pod4f8e0d694c07e04969646aa3c152c34a.slice. Dec 13 14:28:10.832684 systemd[1]: Created slice kubepods-burstable-podc4144e8f85b2123a6afada0c1705bbba.slice. Dec 13 14:28:10.905567 kubelet[1727]: I1213 14:28:10.905493 1727 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:28:10.905567 kubelet[1727]: I1213 14:28:10.905559 1727 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:28:10.905773 kubelet[1727]: I1213 14:28:10.905602 1727 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/c4144e8f85b2123a6afada0c1705bbba-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"c4144e8f85b2123a6afada0c1705bbba\") " pod="kube-system/kube-scheduler-localhost" Dec 13 14:28:10.905773 kubelet[1727]: I1213 14:28:10.905705 1727 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5a9964cdd2dc69b244152cc00e050bf4-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"5a9964cdd2dc69b244152cc00e050bf4\") " pod="kube-system/kube-apiserver-localhost" Dec 13 14:28:10.905773 kubelet[1727]: I1213 14:28:10.905773 1727 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5a9964cdd2dc69b244152cc00e050bf4-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"5a9964cdd2dc69b244152cc00e050bf4\") " pod="kube-system/kube-apiserver-localhost" Dec 13 14:28:10.905876 kubelet[1727]: I1213 14:28:10.905804 1727 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:28:10.905876 kubelet[1727]: I1213 14:28:10.905832 1727 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:28:10.905876 kubelet[1727]: I1213 14:28:10.905866 1727 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:28:10.905945 kubelet[1727]: I1213 14:28:10.905894 1727 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5a9964cdd2dc69b244152cc00e050bf4-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"5a9964cdd2dc69b244152cc00e050bf4\") " pod="kube-system/kube-apiserver-localhost" Dec 13 14:28:11.052703 kubelet[1727]: W1213 14:28:11.052532 1727 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://10.0.0.112:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.112:6443: connect: connection refused Dec 13 14:28:11.052703 kubelet[1727]: E1213 14:28:11.052611 1727 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.112:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.112:6443: connect: connection refused Dec 13 14:28:11.085570 kubelet[1727]: W1213 14:28:11.085494 1727 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://10.0.0.112:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.112:6443: connect: connection refused Dec 13 14:28:11.085570 kubelet[1727]: E1213 14:28:11.085574 1727 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.112:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.112:6443: connect: connection refused Dec 13 14:28:11.129046 kubelet[1727]: E1213 14:28:11.128994 1727 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:11.129636 env[1231]: time="2024-12-13T14:28:11.129570165Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:5a9964cdd2dc69b244152cc00e050bf4,Namespace:kube-system,Attempt:0,}" Dec 13 14:28:11.131709 kubelet[1727]: E1213 14:28:11.131687 1727 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:11.132040 env[1231]: time="2024-12-13T14:28:11.132008485Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:4f8e0d694c07e04969646aa3c152c34a,Namespace:kube-system,Attempt:0,}" Dec 13 14:28:11.134395 kubelet[1727]: E1213 14:28:11.134353 1727 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:11.134793 env[1231]: time="2024-12-13T14:28:11.134767393Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:c4144e8f85b2123a6afada0c1705bbba,Namespace:kube-system,Attempt:0,}" Dec 13 14:28:11.148553 kubelet[1727]: W1213 14:28:11.148477 1727 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://10.0.0.112:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.112:6443: connect: connection refused Dec 13 14:28:11.148553 kubelet[1727]: E1213 14:28:11.148558 1727 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.112:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.112:6443: connect: connection refused Dec 13 14:28:11.518888 kubelet[1727]: E1213 14:28:11.518843 1727 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.112:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.112:6443: connect: connection refused" interval="1.6s" Dec 13 14:28:11.574455 kubelet[1727]: W1213 14:28:11.574401 1727 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://10.0.0.112:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.112:6443: connect: connection refused Dec 13 14:28:11.574455 kubelet[1727]: E1213 14:28:11.574455 1727 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.112:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.112:6443: connect: connection refused Dec 13 14:28:11.608974 kubelet[1727]: I1213 14:28:11.608956 1727 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 14:28:11.609219 kubelet[1727]: E1213 14:28:11.609198 1727 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.112:6443/api/v1/nodes\": dial tcp 10.0.0.112:6443: connect: connection refused" node="localhost" Dec 13 14:28:12.013029 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1925926290.mount: Deactivated successfully. Dec 13 14:28:12.018796 env[1231]: time="2024-12-13T14:28:12.018723105Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:12.019724 env[1231]: time="2024-12-13T14:28:12.019659797Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:12.021470 env[1231]: time="2024-12-13T14:28:12.021435107Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:12.026178 env[1231]: time="2024-12-13T14:28:12.026109390Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:12.027151 env[1231]: time="2024-12-13T14:28:12.027121325Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:12.028291 env[1231]: time="2024-12-13T14:28:12.028256497Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:12.029511 env[1231]: time="2024-12-13T14:28:12.029464115Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:12.030652 env[1231]: time="2024-12-13T14:28:12.030623646Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:12.036958 env[1231]: time="2024-12-13T14:28:12.036878679Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:12.038669 env[1231]: time="2024-12-13T14:28:12.038626301Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:12.039271 env[1231]: time="2024-12-13T14:28:12.039240385Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:12.039883 env[1231]: time="2024-12-13T14:28:12.039860914Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:12.065514 env[1231]: time="2024-12-13T14:28:12.065413440Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:28:12.065762 env[1231]: time="2024-12-13T14:28:12.065471992Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:28:12.065762 env[1231]: time="2024-12-13T14:28:12.065531556Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:28:12.066565 env[1231]: time="2024-12-13T14:28:12.065777139Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/340f2269f2bec9f513448e69d940ad8607cbd005c3dd3d12766dca146a8392e1 pid=1772 runtime=io.containerd.runc.v2 Dec 13 14:28:12.066741 env[1231]: time="2024-12-13T14:28:12.066171441Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:28:12.066741 env[1231]: time="2024-12-13T14:28:12.066214005Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:28:12.066741 env[1231]: time="2024-12-13T14:28:12.066226123Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:28:12.066741 env[1231]: time="2024-12-13T14:28:12.066419962Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b9ec8ff2d4984aa0a8a28f32fa62d8c10f2ad4f78b286f11e3a5c7c93bfbd7c0 pid=1778 runtime=io.containerd.runc.v2 Dec 13 14:28:12.069750 env[1231]: time="2024-12-13T14:28:12.069642919Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:28:12.069945 env[1231]: time="2024-12-13T14:28:12.069715484Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:28:12.069945 env[1231]: time="2024-12-13T14:28:12.069725368Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:28:12.070120 env[1231]: time="2024-12-13T14:28:12.069964285Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b9970aab7eca7ef86b1cdd5aa987a963bc9093563c9a0eec1677ddb6372a0a71 pid=1804 runtime=io.containerd.runc.v2 Dec 13 14:28:12.080549 systemd[1]: Started cri-containerd-340f2269f2bec9f513448e69d940ad8607cbd005c3dd3d12766dca146a8392e1.scope. Dec 13 14:28:12.081428 systemd[1]: Started cri-containerd-b9ec8ff2d4984aa0a8a28f32fa62d8c10f2ad4f78b286f11e3a5c7c93bfbd7c0.scope. Dec 13 14:28:12.086964 systemd[1]: Started cri-containerd-b9970aab7eca7ef86b1cdd5aa987a963bc9093563c9a0eec1677ddb6372a0a71.scope. Dec 13 14:28:12.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.102551 kernel: audit: type=1400 audit(1734100092.095:439): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.102633 kernel: audit: type=1400 audit(1734100092.095:440): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.102652 kernel: audit: type=1400 audit(1734100092.095:441): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.108409 kernel: audit: type=1400 audit(1734100092.095:442): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.108464 kernel: audit: type=1400 audit(1734100092.095:443): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.111338 kernel: audit: type=1400 audit(1734100092.095:444): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.101000 audit: BPF prog-id=58 op=LOAD Dec 13 14:28:12.102000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.102000 audit[1811]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1778 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:12.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239656338666632643439383461613061386132386633326661363264 Dec 13 14:28:12.102000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.102000 audit[1811]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1778 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:12.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239656338666632643439383461613061386132386633326661363264 Dec 13 14:28:12.102000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.102000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.102000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.102000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.102000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.102000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.102000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.102000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.102000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.102000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.102000 audit: BPF prog-id=59 op=LOAD Dec 13 14:28:12.102000 audit[1811]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000253a30 items=0 ppid=1778 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:12.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239656338666632643439383461613061386132386633326661363264 Dec 13 14:28:12.104000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.104000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.104000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.104000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.104000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.104000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.104000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.104000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.110000 audit: BPF prog-id=61 op=LOAD Dec 13 14:28:12.104000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.104000 audit: BPF prog-id=60 op=LOAD Dec 13 14:28:12.104000 audit[1811]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000253a78 items=0 ppid=1778 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:12.104000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239656338666632643439383461613061386132386633326661363264 Dec 13 14:28:12.110000 audit: BPF prog-id=60 op=UNLOAD Dec 13 14:28:12.110000 audit: BPF prog-id=59 op=UNLOAD Dec 13 14:28:12.110000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.110000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.110000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.110000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.110000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.110000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.110000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.110000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.110000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.110000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.110000 audit: BPF prog-id=62 op=LOAD Dec 13 14:28:12.110000 audit[1811]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000253e88 items=0 ppid=1778 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:12.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239656338666632643439383461613061386132386633326661363264 Dec 13 14:28:12.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.113000 audit: BPF prog-id=63 op=LOAD Dec 13 14:28:12.113000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.113000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.113000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.113000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.113000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.113000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.113000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.113000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.113000 audit: BPF prog-id=64 op=LOAD Dec 13 14:28:12.113000 audit[1826]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003107d0 items=0 ppid=1804 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:12.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239393730616162376563613765663836623163646435616139383761 Dec 13 14:28:12.114000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.114000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.114000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.114000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.114000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.114000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.114000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.114000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.114000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.114000 audit: BPF prog-id=65 op=LOAD Dec 13 14:28:12.114000 audit[1826]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000310818 items=0 ppid=1804 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:12.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239393730616162376563613765663836623163646435616139383761 Dec 13 14:28:12.114000 audit: BPF prog-id=65 op=UNLOAD Dec 13 14:28:12.114000 audit: BPF prog-id=64 op=UNLOAD Dec 13 14:28:12.114000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.114000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.114000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.114000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.114000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.114000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.114000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.114000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.114000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.114000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.114000 audit: BPF prog-id=66 op=LOAD Dec 13 14:28:12.114000 audit[1826]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000310c28 items=0 ppid=1804 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:12.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239393730616162376563613765663836623163646435616139383761 Dec 13 14:28:12.115000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.115000 audit[1812]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1772 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:12.115000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334306632323639663262656339663531333434386536396439343061 Dec 13 14:28:12.115000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.115000 audit[1812]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1772 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:12.115000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334306632323639663262656339663531333434386536396439343061 Dec 13 14:28:12.115000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.115000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.115000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.115000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.115000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.115000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.115000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.115000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.115000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.115000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.115000 audit: BPF prog-id=67 op=LOAD Dec 13 14:28:12.115000 audit[1812]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000380f50 items=0 ppid=1772 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:12.115000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334306632323639663262656339663531333434386536396439343061 Dec 13 14:28:12.117000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.117000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.117000 audit[1812]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000380f98 items=0 ppid=1772 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:12.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334306632323639663262656339663531333434386536396439343061 Dec 13 14:28:12.117000 audit: BPF prog-id=68 op=UNLOAD Dec 13 14:28:12.117000 audit: BPF prog-id=67 op=UNLOAD Dec 13 14:28:12.117000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.117000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.117000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.117000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.117000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.117000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.117000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.117000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.117000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.117000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.117000 audit: BPF prog-id=69 op=LOAD Dec 13 14:28:12.117000 audit[1812]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003813a8 items=0 ppid=1772 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:12.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334306632323639663262656339663531333434386536396439343061 Dec 13 14:28:12.137927 kubelet[1727]: E1213 14:28:12.137883 1727 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.0.0.112:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.0.0.112:6443: connect: connection refused Dec 13 14:28:12.140726 env[1231]: time="2024-12-13T14:28:12.140689731Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:5a9964cdd2dc69b244152cc00e050bf4,Namespace:kube-system,Attempt:0,} returns sandbox id \"340f2269f2bec9f513448e69d940ad8607cbd005c3dd3d12766dca146a8392e1\"" Dec 13 14:28:12.141470 env[1231]: time="2024-12-13T14:28:12.141402513Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:c4144e8f85b2123a6afada0c1705bbba,Namespace:kube-system,Attempt:0,} returns sandbox id \"b9ec8ff2d4984aa0a8a28f32fa62d8c10f2ad4f78b286f11e3a5c7c93bfbd7c0\"" Dec 13 14:28:12.142103 kubelet[1727]: E1213 14:28:12.141965 1727 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:12.142427 kubelet[1727]: E1213 14:28:12.142394 1727 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:12.145364 env[1231]: time="2024-12-13T14:28:12.145327726Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:4f8e0d694c07e04969646aa3c152c34a,Namespace:kube-system,Attempt:0,} returns sandbox id \"b9970aab7eca7ef86b1cdd5aa987a963bc9093563c9a0eec1677ddb6372a0a71\"" Dec 13 14:28:12.145659 env[1231]: time="2024-12-13T14:28:12.145635470Z" level=info msg="CreateContainer within sandbox \"b9ec8ff2d4984aa0a8a28f32fa62d8c10f2ad4f78b286f11e3a5c7c93bfbd7c0\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Dec 13 14:28:12.147664 env[1231]: time="2024-12-13T14:28:12.147633998Z" level=info msg="CreateContainer within sandbox \"340f2269f2bec9f513448e69d940ad8607cbd005c3dd3d12766dca146a8392e1\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Dec 13 14:28:12.148199 kubelet[1727]: E1213 14:28:12.148022 1727 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:12.160948 env[1231]: time="2024-12-13T14:28:12.160918675Z" level=info msg="CreateContainer within sandbox \"b9970aab7eca7ef86b1cdd5aa987a963bc9093563c9a0eec1677ddb6372a0a71\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Dec 13 14:28:12.344943 env[1231]: time="2024-12-13T14:28:12.344796981Z" level=info msg="CreateContainer within sandbox \"b9ec8ff2d4984aa0a8a28f32fa62d8c10f2ad4f78b286f11e3a5c7c93bfbd7c0\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"b14e43bcf7f1180f4e4682b5273ee628d6d8e1e10b12266d55eab1c8a3f5b30d\"" Dec 13 14:28:12.345653 env[1231]: time="2024-12-13T14:28:12.345589105Z" level=info msg="StartContainer for \"b14e43bcf7f1180f4e4682b5273ee628d6d8e1e10b12266d55eab1c8a3f5b30d\"" Dec 13 14:28:12.354790 env[1231]: time="2024-12-13T14:28:12.354722511Z" level=info msg="CreateContainer within sandbox \"340f2269f2bec9f513448e69d940ad8607cbd005c3dd3d12766dca146a8392e1\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"2906ee2b42b32ee6a728f617db9fc4ce5b052343c81c3672569577aef83d026c\"" Dec 13 14:28:12.355589 env[1231]: time="2024-12-13T14:28:12.355547274Z" level=info msg="CreateContainer within sandbox \"b9970aab7eca7ef86b1cdd5aa987a963bc9093563c9a0eec1677ddb6372a0a71\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"f00e92c4c9d0534ba83ed71eeca6ba566754697617dcebb40211ae850ce851a1\"" Dec 13 14:28:12.356047 env[1231]: time="2024-12-13T14:28:12.356018874Z" level=info msg="StartContainer for \"2906ee2b42b32ee6a728f617db9fc4ce5b052343c81c3672569577aef83d026c\"" Dec 13 14:28:12.356122 env[1231]: time="2024-12-13T14:28:12.356019565Z" level=info msg="StartContainer for \"f00e92c4c9d0534ba83ed71eeca6ba566754697617dcebb40211ae850ce851a1\"" Dec 13 14:28:12.363331 systemd[1]: Started cri-containerd-b14e43bcf7f1180f4e4682b5273ee628d6d8e1e10b12266d55eab1c8a3f5b30d.scope. Dec 13 14:28:12.371896 systemd[1]: Started cri-containerd-f00e92c4c9d0534ba83ed71eeca6ba566754697617dcebb40211ae850ce851a1.scope. Dec 13 14:28:12.377252 systemd[1]: Started cri-containerd-2906ee2b42b32ee6a728f617db9fc4ce5b052343c81c3672569577aef83d026c.scope. Dec 13 14:28:12.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.379000 audit: BPF prog-id=70 op=LOAD Dec 13 14:28:12.380000 audit[1899]: AVC avc: denied { bpf } for pid=1899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.380000 audit[1899]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000199c48 a2=10 a3=1c items=0 ppid=1778 pid=1899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:12.380000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231346534336263663766313138306634653436383262353237336565 Dec 13 14:28:12.381000 audit[1899]: AVC avc: denied { perfmon } for pid=1899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.381000 audit[1899]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001996b0 a2=3c a3=8 items=0 ppid=1778 pid=1899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:12.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231346534336263663766313138306634653436383262353237336565 Dec 13 14:28:12.381000 audit[1899]: AVC avc: denied { bpf } for pid=1899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.381000 audit[1899]: AVC avc: denied { bpf } for pid=1899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.381000 audit[1899]: AVC avc: denied { bpf } for pid=1899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.381000 audit[1899]: AVC avc: denied { perfmon } for pid=1899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.381000 audit[1899]: AVC avc: denied { perfmon } for pid=1899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.381000 audit[1899]: AVC avc: denied { perfmon } for pid=1899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.381000 audit[1899]: AVC avc: denied { perfmon } for pid=1899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.381000 audit[1899]: AVC avc: denied { perfmon } for pid=1899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.381000 audit[1899]: AVC avc: denied { bpf } for pid=1899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.381000 audit[1899]: AVC avc: denied { bpf } for pid=1899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.381000 audit: BPF prog-id=71 op=LOAD Dec 13 14:28:12.381000 audit[1899]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001999d8 a2=78 a3=c00021ec60 items=0 ppid=1778 pid=1899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:12.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231346534336263663766313138306634653436383262353237336565 Dec 13 14:28:12.382000 audit[1899]: AVC avc: denied { bpf } for pid=1899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.382000 audit[1899]: AVC avc: denied { bpf } for pid=1899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.382000 audit[1899]: AVC avc: denied { perfmon } for pid=1899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.382000 audit[1899]: AVC avc: denied { perfmon } for pid=1899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.382000 audit[1899]: AVC avc: denied { perfmon } for pid=1899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.382000 audit[1899]: AVC avc: denied { perfmon } for pid=1899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.382000 audit[1899]: AVC avc: denied { perfmon } for pid=1899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.382000 audit[1899]: AVC avc: denied { bpf } for pid=1899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.382000 audit[1899]: AVC avc: denied { bpf } for pid=1899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.382000 audit: BPF prog-id=72 op=LOAD Dec 13 14:28:12.382000 audit[1899]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000199770 a2=78 a3=c00021eca8 items=0 ppid=1778 pid=1899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:12.382000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231346534336263663766313138306634653436383262353237336565 Dec 13 14:28:12.383000 audit: BPF prog-id=72 op=UNLOAD Dec 13 14:28:12.383000 audit: BPF prog-id=71 op=UNLOAD Dec 13 14:28:12.383000 audit[1899]: AVC avc: denied { bpf } for pid=1899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.383000 audit[1899]: AVC avc: denied { bpf } for pid=1899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.383000 audit[1899]: AVC avc: denied { bpf } for pid=1899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.383000 audit[1899]: AVC avc: denied { perfmon } for pid=1899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.383000 audit[1899]: AVC avc: denied { perfmon } for pid=1899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.383000 audit[1899]: AVC avc: denied { perfmon } for pid=1899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.383000 audit[1899]: AVC avc: denied { perfmon } for pid=1899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.383000 audit[1899]: AVC avc: denied { perfmon } for pid=1899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.383000 audit[1899]: AVC avc: denied { bpf } for pid=1899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.383000 audit[1899]: AVC avc: denied { bpf } for pid=1899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.383000 audit: BPF prog-id=73 op=LOAD Dec 13 14:28:12.383000 audit[1899]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000199c30 a2=78 a3=c00021f0b8 items=0 ppid=1778 pid=1899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:12.383000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231346534336263663766313138306634653436383262353237336565 Dec 13 14:28:12.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.386000 audit: BPF prog-id=74 op=LOAD Dec 13 14:28:12.387000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.387000 audit[1925]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1804 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:12.387000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630306539326334633964303533346261383365643731656563613662 Dec 13 14:28:12.387000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.387000 audit[1925]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1804 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:12.387000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630306539326334633964303533346261383365643731656563613662 Dec 13 14:28:12.387000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.387000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.387000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.387000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.387000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.387000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.387000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.387000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.387000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.387000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.387000 audit: BPF prog-id=75 op=LOAD Dec 13 14:28:12.387000 audit[1925]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000293360 items=0 ppid=1804 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:12.387000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630306539326334633964303533346261383365643731656563613662 Dec 13 14:28:12.387000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.387000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.387000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.387000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.387000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.387000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.387000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.387000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.387000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.387000 audit: BPF prog-id=76 op=LOAD Dec 13 14:28:12.387000 audit[1925]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002933a8 items=0 ppid=1804 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:12.387000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630306539326334633964303533346261383365643731656563613662 Dec 13 14:28:12.387000 audit: BPF prog-id=76 op=UNLOAD Dec 13 14:28:12.387000 audit: BPF prog-id=75 op=UNLOAD Dec 13 14:28:12.387000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.387000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.387000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.387000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.387000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.387000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.387000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.387000 audit[1925]: AVC avc: denied { perfmon } for pid=1925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.387000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.387000 audit[1925]: AVC avc: denied { bpf } for pid=1925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.387000 audit: BPF prog-id=77 op=LOAD Dec 13 14:28:12.387000 audit[1925]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002937b8 items=0 ppid=1804 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:12.387000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630306539326334633964303533346261383365643731656563613662 Dec 13 14:28:12.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.400000 audit: BPF prog-id=78 op=LOAD Dec 13 14:28:12.403000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.403000 audit[1924]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1772 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:12.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239303665653262343262333265653661373238663631376462396663 Dec 13 14:28:12.403000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.403000 audit[1924]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1772 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:12.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239303665653262343262333265653661373238663631376462396663 Dec 13 14:28:12.403000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.403000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.403000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.403000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.403000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.403000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.403000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.403000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.403000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.403000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.403000 audit: BPF prog-id=79 op=LOAD Dec 13 14:28:12.403000 audit[1924]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002996a0 items=0 ppid=1772 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:12.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239303665653262343262333265653661373238663631376462396663 Dec 13 14:28:12.403000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.403000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.403000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.403000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.403000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.403000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.403000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.403000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.403000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.403000 audit: BPF prog-id=80 op=LOAD Dec 13 14:28:12.403000 audit[1924]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002996e8 items=0 ppid=1772 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:12.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239303665653262343262333265653661373238663631376462396663 Dec 13 14:28:12.403000 audit: BPF prog-id=80 op=UNLOAD Dec 13 14:28:12.403000 audit: BPF prog-id=79 op=UNLOAD Dec 13 14:28:12.403000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.403000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.403000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.403000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.403000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.403000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.403000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.403000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.403000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.403000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:12.403000 audit: BPF prog-id=81 op=LOAD Dec 13 14:28:12.403000 audit[1924]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000299af8 items=0 ppid=1772 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:12.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239303665653262343262333265653661373238663631376462396663 Dec 13 14:28:12.428264 env[1231]: time="2024-12-13T14:28:12.428209499Z" level=info msg="StartContainer for \"f00e92c4c9d0534ba83ed71eeca6ba566754697617dcebb40211ae850ce851a1\" returns successfully" Dec 13 14:28:12.428433 env[1231]: time="2024-12-13T14:28:12.428393212Z" level=info msg="StartContainer for \"b14e43bcf7f1180f4e4682b5273ee628d6d8e1e10b12266d55eab1c8a3f5b30d\" returns successfully" Dec 13 14:28:12.451499 env[1231]: time="2024-12-13T14:28:12.451416898Z" level=info msg="StartContainer for \"2906ee2b42b32ee6a728f617db9fc4ce5b052343c81c3672569577aef83d026c\" returns successfully" Dec 13 14:28:13.127112 kubelet[1727]: E1213 14:28:13.127059 1727 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:13.129430 kubelet[1727]: E1213 14:28:13.129401 1727 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:13.131409 kubelet[1727]: E1213 14:28:13.131387 1727 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:13.210946 kubelet[1727]: I1213 14:28:13.210906 1727 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 14:28:13.228000 audit[1953]: AVC avc: denied { watch } for pid=1953 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8232 scontext=system_u:system_r:svirt_lxc_net_t:s0:c591,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:28:13.228000 audit[1953]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0010bad50 a2=fc6 a3=0 items=0 ppid=1804 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c591,c683 key=(null) Dec 13 14:28:13.228000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:28:13.229000 audit[1953]: AVC avc: denied { watch } for pid=1953 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c591,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:28:13.229000 audit[1953]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001128000 a2=fc6 a3=0 items=0 ppid=1804 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c591,c683 key=(null) Dec 13 14:28:13.229000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:28:13.307000 audit[1960]: AVC avc: denied { watch } for pid=1960 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c215,c471 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:28:13.307000 audit[1960]: AVC avc: denied { watch } for pid=1960 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8232 scontext=system_u:system_r:svirt_lxc_net_t:s0:c215,c471 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:28:13.307000 audit[1960]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0034f88a0 a2=fc6 a3=0 items=0 ppid=1772 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c215,c471 key=(null) Dec 13 14:28:13.307000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:28:13.307000 audit[1960]: AVC avc: denied { watch } for pid=1960 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=8228 scontext=system_u:system_r:svirt_lxc_net_t:s0:c215,c471 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:28:13.307000 audit[1960]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0034f8930 a2=fc6 a3=0 items=0 ppid=1772 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c215,c471 key=(null) Dec 13 14:28:13.307000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:28:13.307000 audit[1960]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c007ea92c0 a2=fc6 a3=0 items=0 ppid=1772 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c215,c471 key=(null) Dec 13 14:28:13.308000 audit[1960]: AVC avc: denied { watch } for pid=1960 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c215,c471 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:28:13.308000 audit[1960]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4b a1=c004397c50 a2=fc6 a3=0 items=0 ppid=1772 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c215,c471 key=(null) Dec 13 14:28:13.308000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:28:13.307000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:28:13.312000 audit[1960]: AVC avc: denied { watch } for pid=1960 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c215,c471 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:28:13.312000 audit[1960]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c0040a0720 a2=fc6 a3=0 items=0 ppid=1772 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c215,c471 key=(null) Dec 13 14:28:13.312000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:28:13.312000 audit[1960]: AVC avc: denied { watch } for pid=1960 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8232 scontext=system_u:system_r:svirt_lxc_net_t:s0:c215,c471 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:28:13.312000 audit[1960]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c0037a2c60 a2=fc6 a3=0 items=0 ppid=1772 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c215,c471 key=(null) Dec 13 14:28:13.312000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:28:13.337148 kubelet[1727]: E1213 14:28:13.337108 1727 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" Dec 13 14:28:13.461781 kubelet[1727]: I1213 14:28:13.461627 1727 kubelet_node_status.go:76] "Successfully registered node" node="localhost" Dec 13 14:28:14.084546 kubelet[1727]: I1213 14:28:14.084485 1727 apiserver.go:52] "Watching apiserver" Dec 13 14:28:14.102883 kubelet[1727]: I1213 14:28:14.102847 1727 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 14:28:14.136980 kubelet[1727]: E1213 14:28:14.136932 1727 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-localhost" Dec 13 14:28:14.137400 kubelet[1727]: E1213 14:28:14.137368 1727 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:16.223374 systemd[1]: Reloading. Dec 13 14:28:16.295896 /usr/lib/systemd/system-generators/torcx-generator[2032]: time="2024-12-13T14:28:16Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:28:16.295935 /usr/lib/systemd/system-generators/torcx-generator[2032]: time="2024-12-13T14:28:16Z" level=info msg="torcx already run" Dec 13 14:28:16.562904 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:28:16.562921 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:28:16.580843 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:28:16.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.656004 kernel: kauditd_printk_skb: 392 callbacks suppressed Dec 13 14:28:16.656100 kernel: audit: type=1400 audit(1734100096.653:547): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.661949 kernel: audit: type=1400 audit(1734100096.653:548): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.662126 kernel: audit: type=1400 audit(1734100096.653:549): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.664853 kernel: audit: type=1400 audit(1734100096.653:550): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.667795 kernel: audit: type=1400 audit(1734100096.653:551): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.670720 kernel: audit: type=1400 audit(1734100096.653:552): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.673877 kernel: audit: type=1400 audit(1734100096.653:553): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.677101 kernel: audit: type=1400 audit(1734100096.653:554): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.680065 kernel: audit: type=1400 audit(1734100096.653:555): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.682963 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 14:28:16.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.657000 audit: BPF prog-id=82 op=LOAD Dec 13 14:28:16.657000 audit: BPF prog-id=74 op=UNLOAD Dec 13 14:28:16.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.660000 audit: BPF prog-id=83 op=LOAD Dec 13 14:28:16.660000 audit: BPF prog-id=61 op=UNLOAD Dec 13 14:28:16.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.663000 audit: BPF prog-id=84 op=LOAD Dec 13 14:28:16.663000 audit: BPF prog-id=58 op=UNLOAD Dec 13 14:28:16.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.666000 audit: BPF prog-id=85 op=LOAD Dec 13 14:28:16.666000 audit: BPF prog-id=43 op=UNLOAD Dec 13 14:28:16.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.672000 audit: BPF prog-id=86 op=LOAD Dec 13 14:28:16.672000 audit: BPF prog-id=44 op=UNLOAD Dec 13 14:28:16.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.678000 audit: BPF prog-id=87 op=LOAD Dec 13 14:28:16.679000 audit: BPF prog-id=78 op=UNLOAD Dec 13 14:28:16.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.683000 audit: BPF prog-id=88 op=LOAD Dec 13 14:28:16.683000 audit: BPF prog-id=45 op=UNLOAD Dec 13 14:28:16.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.684000 audit: BPF prog-id=89 op=LOAD Dec 13 14:28:16.684000 audit: BPF prog-id=63 op=UNLOAD Dec 13 14:28:16.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.684000 audit: BPF prog-id=90 op=LOAD Dec 13 14:28:16.684000 audit: BPF prog-id=46 op=UNLOAD Dec 13 14:28:16.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.684000 audit: BPF prog-id=91 op=LOAD Dec 13 14:28:16.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.685000 audit: BPF prog-id=92 op=LOAD Dec 13 14:28:16.685000 audit: BPF prog-id=47 op=UNLOAD Dec 13 14:28:16.685000 audit: BPF prog-id=48 op=UNLOAD Dec 13 14:28:16.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.685000 audit: BPF prog-id=93 op=LOAD Dec 13 14:28:16.685000 audit: BPF prog-id=70 op=UNLOAD Dec 13 14:28:16.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.686000 audit: BPF prog-id=94 op=LOAD Dec 13 14:28:16.686000 audit: BPF prog-id=49 op=UNLOAD Dec 13 14:28:16.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.686000 audit: BPF prog-id=95 op=LOAD Dec 13 14:28:16.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.686000 audit: BPF prog-id=96 op=LOAD Dec 13 14:28:16.686000 audit: BPF prog-id=50 op=UNLOAD Dec 13 14:28:16.686000 audit: BPF prog-id=51 op=UNLOAD Dec 13 14:28:16.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.687000 audit: BPF prog-id=97 op=LOAD Dec 13 14:28:16.687000 audit: BPF prog-id=52 op=UNLOAD Dec 13 14:28:16.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.688000 audit: BPF prog-id=98 op=LOAD Dec 13 14:28:16.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.688000 audit: BPF prog-id=99 op=LOAD Dec 13 14:28:16.688000 audit: BPF prog-id=53 op=UNLOAD Dec 13 14:28:16.688000 audit: BPF prog-id=54 op=UNLOAD Dec 13 14:28:16.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.690000 audit: BPF prog-id=100 op=LOAD Dec 13 14:28:16.690000 audit: BPF prog-id=55 op=UNLOAD Dec 13 14:28:16.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.690000 audit: BPF prog-id=101 op=LOAD Dec 13 14:28:16.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.691000 audit: BPF prog-id=102 op=LOAD Dec 13 14:28:16.691000 audit: BPF prog-id=56 op=UNLOAD Dec 13 14:28:16.691000 audit: BPF prog-id=57 op=UNLOAD Dec 13 14:28:16.704227 systemd[1]: Stopping kubelet.service... Dec 13 14:28:16.727349 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:28:16.727522 systemd[1]: Stopped kubelet.service. Dec 13 14:28:16.726000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:16.729341 systemd[1]: Starting kubelet.service... Dec 13 14:28:16.807468 systemd[1]: Started kubelet.service. Dec 13 14:28:16.806000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:16.853134 kubelet[2075]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:28:16.853134 kubelet[2075]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:28:16.853134 kubelet[2075]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:28:16.853134 kubelet[2075]: I1213 14:28:16.850890 2075 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:28:16.855217 kubelet[2075]: I1213 14:28:16.855182 2075 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 14:28:16.855217 kubelet[2075]: I1213 14:28:16.855211 2075 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:28:16.855454 kubelet[2075]: I1213 14:28:16.855431 2075 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 14:28:16.858749 kubelet[2075]: I1213 14:28:16.858717 2075 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Dec 13 14:28:16.860517 kubelet[2075]: I1213 14:28:16.860483 2075 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:28:16.871033 kubelet[2075]: I1213 14:28:16.870988 2075 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:28:16.871257 kubelet[2075]: I1213 14:28:16.871230 2075 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:28:16.871422 kubelet[2075]: I1213 14:28:16.871388 2075 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 14:28:16.871422 kubelet[2075]: I1213 14:28:16.871415 2075 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:28:16.871422 kubelet[2075]: I1213 14:28:16.871425 2075 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 14:28:16.871614 kubelet[2075]: I1213 14:28:16.871450 2075 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:28:16.871614 kubelet[2075]: I1213 14:28:16.871527 2075 kubelet.go:396] "Attempting to sync node with API server" Dec 13 14:28:16.871614 kubelet[2075]: I1213 14:28:16.871541 2075 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:28:16.871614 kubelet[2075]: I1213 14:28:16.871571 2075 kubelet.go:312] "Adding apiserver pod source" Dec 13 14:28:16.871614 kubelet[2075]: I1213 14:28:16.871585 2075 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:28:16.872732 kubelet[2075]: I1213 14:28:16.872697 2075 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:28:16.873026 kubelet[2075]: I1213 14:28:16.872999 2075 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:28:16.873705 kubelet[2075]: I1213 14:28:16.873675 2075 server.go:1256] "Started kubelet" Dec 13 14:28:16.874962 kubelet[2075]: I1213 14:28:16.874936 2075 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:28:16.875892 kubelet[2075]: I1213 14:28:16.875867 2075 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:28:16.876241 kubelet[2075]: I1213 14:28:16.876215 2075 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:28:16.876682 kubelet[2075]: I1213 14:28:16.876654 2075 server.go:461] "Adding debug handlers to kubelet server" Dec 13 14:28:16.881000 audit[2075]: AVC avc: denied { mac_admin } for pid=2075 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.881000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:28:16.881000 audit[2075]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000cb8ff0 a1=c0008f58c0 a2=c000cb8fc0 a3=25 items=0 ppid=1 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:16.881000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:28:16.881000 audit[2075]: AVC avc: denied { mac_admin } for pid=2075 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.881000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:28:16.881000 audit[2075]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0004f3580 a1=c0008f58d8 a2=c000cb9080 a3=25 items=0 ppid=1 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:16.881000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:28:16.882811 kubelet[2075]: I1213 14:28:16.882233 2075 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:28:16.882811 kubelet[2075]: I1213 14:28:16.882270 2075 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:28:16.882811 kubelet[2075]: I1213 14:28:16.882290 2075 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:28:16.883015 kubelet[2075]: E1213 14:28:16.882949 2075 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:28:16.886121 kubelet[2075]: I1213 14:28:16.885903 2075 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 14:28:16.886121 kubelet[2075]: I1213 14:28:16.885997 2075 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 14:28:16.886121 kubelet[2075]: I1213 14:28:16.886110 2075 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 14:28:16.886216 kubelet[2075]: I1213 14:28:16.886127 2075 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:28:16.886251 kubelet[2075]: I1213 14:28:16.886206 2075 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:28:16.887694 kubelet[2075]: I1213 14:28:16.887674 2075 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:28:16.898296 kubelet[2075]: I1213 14:28:16.898254 2075 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:28:16.900317 kubelet[2075]: I1213 14:28:16.900296 2075 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:28:16.900374 kubelet[2075]: I1213 14:28:16.900329 2075 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:28:16.900594 kubelet[2075]: I1213 14:28:16.900568 2075 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 14:28:16.900650 kubelet[2075]: E1213 14:28:16.900627 2075 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 14:28:16.917551 kubelet[2075]: I1213 14:28:16.917506 2075 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:28:16.917551 kubelet[2075]: I1213 14:28:16.917533 2075 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:28:16.917551 kubelet[2075]: I1213 14:28:16.917551 2075 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:28:16.917758 kubelet[2075]: I1213 14:28:16.917722 2075 state_mem.go:88] "Updated default CPUSet" cpuSet="" Dec 13 14:28:16.917758 kubelet[2075]: I1213 14:28:16.917745 2075 state_mem.go:96] "Updated CPUSet assignments" assignments={} Dec 13 14:28:16.917758 kubelet[2075]: I1213 14:28:16.917753 2075 policy_none.go:49] "None policy: Start" Dec 13 14:28:16.919316 kubelet[2075]: I1213 14:28:16.918812 2075 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:28:16.919316 kubelet[2075]: I1213 14:28:16.918835 2075 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:28:16.919316 kubelet[2075]: I1213 14:28:16.918963 2075 state_mem.go:75] "Updated machine memory state" Dec 13 14:28:16.922675 kubelet[2075]: I1213 14:28:16.922651 2075 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:28:16.921000 audit[2075]: AVC avc: denied { mac_admin } for pid=2075 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:16.921000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:28:16.921000 audit[2075]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009a5800 a1=c0010ef9e0 a2=c0009a57d0 a3=25 items=0 ppid=1 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:16.921000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:28:16.922901 kubelet[2075]: I1213 14:28:16.922714 2075 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:28:16.923433 kubelet[2075]: I1213 14:28:16.923350 2075 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:28:17.001012 kubelet[2075]: I1213 14:28:17.000936 2075 topology_manager.go:215] "Topology Admit Handler" podUID="5a9964cdd2dc69b244152cc00e050bf4" podNamespace="kube-system" podName="kube-apiserver-localhost" Dec 13 14:28:17.001271 kubelet[2075]: I1213 14:28:17.001054 2075 topology_manager.go:215] "Topology Admit Handler" podUID="4f8e0d694c07e04969646aa3c152c34a" podNamespace="kube-system" podName="kube-controller-manager-localhost" Dec 13 14:28:17.001271 kubelet[2075]: I1213 14:28:17.001123 2075 topology_manager.go:215] "Topology Admit Handler" podUID="c4144e8f85b2123a6afada0c1705bbba" podNamespace="kube-system" podName="kube-scheduler-localhost" Dec 13 14:28:17.031057 kubelet[2075]: I1213 14:28:17.031019 2075 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 14:28:17.077415 kubelet[2075]: I1213 14:28:17.077348 2075 kubelet_node_status.go:112] "Node was previously registered" node="localhost" Dec 13 14:28:17.077627 kubelet[2075]: I1213 14:28:17.077443 2075 kubelet_node_status.go:76] "Successfully registered node" node="localhost" Dec 13 14:28:17.086930 kubelet[2075]: I1213 14:28:17.086874 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/c4144e8f85b2123a6afada0c1705bbba-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"c4144e8f85b2123a6afada0c1705bbba\") " pod="kube-system/kube-scheduler-localhost" Dec 13 14:28:17.086930 kubelet[2075]: I1213 14:28:17.086914 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5a9964cdd2dc69b244152cc00e050bf4-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"5a9964cdd2dc69b244152cc00e050bf4\") " pod="kube-system/kube-apiserver-localhost" Dec 13 14:28:17.087203 kubelet[2075]: I1213 14:28:17.086961 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:28:17.087337 kubelet[2075]: I1213 14:28:17.087021 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:28:17.087398 kubelet[2075]: I1213 14:28:17.087366 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:28:17.087425 kubelet[2075]: I1213 14:28:17.087409 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5a9964cdd2dc69b244152cc00e050bf4-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"5a9964cdd2dc69b244152cc00e050bf4\") " pod="kube-system/kube-apiserver-localhost" Dec 13 14:28:17.087449 kubelet[2075]: I1213 14:28:17.087443 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5a9964cdd2dc69b244152cc00e050bf4-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"5a9964cdd2dc69b244152cc00e050bf4\") " pod="kube-system/kube-apiserver-localhost" Dec 13 14:28:17.087535 kubelet[2075]: I1213 14:28:17.087493 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:28:17.087535 kubelet[2075]: I1213 14:28:17.087538 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:28:17.376618 kubelet[2075]: E1213 14:28:17.376553 2075 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:17.376968 kubelet[2075]: E1213 14:28:17.376939 2075 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:17.377147 kubelet[2075]: E1213 14:28:17.376994 2075 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:17.875408 kubelet[2075]: I1213 14:28:17.875357 2075 apiserver.go:52] "Watching apiserver" Dec 13 14:28:17.886724 kubelet[2075]: I1213 14:28:17.886669 2075 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 14:28:17.909501 kubelet[2075]: E1213 14:28:17.909446 2075 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:17.909985 kubelet[2075]: E1213 14:28:17.909964 2075 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:17.919544 kubelet[2075]: E1213 14:28:17.919479 2075 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Dec 13 14:28:17.919958 kubelet[2075]: E1213 14:28:17.919932 2075 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:17.938449 kubelet[2075]: I1213 14:28:17.938399 2075 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=0.938350646 podStartE2EDuration="938.350646ms" podCreationTimestamp="2024-12-13 14:28:17 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:28:17.938221653 +0000 UTC m=+1.126957028" watchObservedRunningTime="2024-12-13 14:28:17.938350646 +0000 UTC m=+1.127086001" Dec 13 14:28:17.953394 kubelet[2075]: I1213 14:28:17.953347 2075 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=0.953283233 podStartE2EDuration="953.283233ms" podCreationTimestamp="2024-12-13 14:28:17 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:28:17.952733394 +0000 UTC m=+1.141468759" watchObservedRunningTime="2024-12-13 14:28:17.953283233 +0000 UTC m=+1.142018598" Dec 13 14:28:17.972063 kubelet[2075]: I1213 14:28:17.972007 2075 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=0.971965513 podStartE2EDuration="971.965513ms" podCreationTimestamp="2024-12-13 14:28:17 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:28:17.962120959 +0000 UTC m=+1.150856315" watchObservedRunningTime="2024-12-13 14:28:17.971965513 +0000 UTC m=+1.160700868" Dec 13 14:28:18.909833 kubelet[2075]: E1213 14:28:18.909794 2075 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:19.911020 kubelet[2075]: E1213 14:28:19.910959 2075 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:21.110847 kubelet[2075]: E1213 14:28:21.110780 2075 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:21.169633 sudo[1364]: pam_unix(sudo:session): session closed for user root Dec 13 14:28:21.168000 audit[1364]: USER_END pid=1364 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:28:21.168000 audit[1364]: CRED_DISP pid=1364 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:28:21.171344 sshd[1360]: pam_unix(sshd:session): session closed for user core Dec 13 14:28:21.171000 audit[1360]: USER_END pid=1360 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:21.171000 audit[1360]: CRED_DISP pid=1360 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:21.173951 systemd[1]: sshd@6-10.0.0.112:22-10.0.0.1:36058.service: Deactivated successfully. Dec 13 14:28:21.173000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.112:22-10.0.0.1:36058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:21.174766 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 14:28:21.174931 systemd[1]: session-7.scope: Consumed 4.126s CPU time. Dec 13 14:28:21.175536 systemd-logind[1219]: Session 7 logged out. Waiting for processes to exit. Dec 13 14:28:21.176416 systemd-logind[1219]: Removed session 7. Dec 13 14:28:25.073790 kubelet[2075]: E1213 14:28:25.073756 2075 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:25.919322 kubelet[2075]: E1213 14:28:25.919293 2075 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:26.095000 audit[1953]: AVC avc: denied { watch } for pid=1953 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=8269 scontext=system_u:system_r:svirt_lxc_net_t:s0:c591,c683 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 14:28:26.097767 kernel: kauditd_printk_skb: 255 callbacks suppressed Dec 13 14:28:26.097837 kernel: audit: type=1400 audit(1734100106.095:800): avc: denied { watch } for pid=1953 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=8269 scontext=system_u:system_r:svirt_lxc_net_t:s0:c591,c683 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 14:28:26.095000 audit[1953]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c19740 a2=fc6 a3=0 items=0 ppid=1804 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c591,c683 key=(null) Dec 13 14:28:26.107815 kernel: audit: type=1300 audit(1734100106.095:800): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c19740 a2=fc6 a3=0 items=0 ppid=1804 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c591,c683 key=(null) Dec 13 14:28:26.107875 kernel: audit: type=1327 audit(1734100106.095:800): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:28:26.095000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:28:26.744000 audit[1953]: AVC avc: denied { watch } for pid=1953 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c591,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:28:26.744000 audit[1953]: AVC avc: denied { watch } for pid=1953 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c591,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:28:26.754064 kernel: audit: type=1400 audit(1734100106.744:801): avc: denied { watch } for pid=1953 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c591,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:28:26.754148 kernel: audit: type=1400 audit(1734100106.744:802): avc: denied { watch } for pid=1953 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c591,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:28:26.754177 kernel: audit: type=1300 audit(1734100106.744:802): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000f14080 a2=fc6 a3=0 items=0 ppid=1804 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c591,c683 key=(null) Dec 13 14:28:26.744000 audit[1953]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000f14080 a2=fc6 a3=0 items=0 ppid=1804 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c591,c683 key=(null) Dec 13 14:28:26.765741 kernel: audit: type=1327 audit(1734100106.744:802): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:28:26.744000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:28:26.769957 kernel: audit: type=1400 audit(1734100106.745:803): avc: denied { watch } for pid=1953 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c591,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:28:26.745000 audit[1953]: AVC avc: denied { watch } for pid=1953 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c591,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:28:26.745000 audit[1953]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000add640 a2=fc6 a3=0 items=0 ppid=1804 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c591,c683 key=(null) Dec 13 14:28:26.790236 kernel: audit: type=1300 audit(1734100106.745:803): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000add640 a2=fc6 a3=0 items=0 ppid=1804 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c591,c683 key=(null) Dec 13 14:28:26.790456 kernel: audit: type=1327 audit(1734100106.745:803): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:28:26.745000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:28:26.745000 audit[1953]: AVC avc: denied { watch } for pid=1953 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c591,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:28:26.745000 audit[1953]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000add680 a2=fc6 a3=0 items=0 ppid=1804 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c591,c683 key=(null) Dec 13 14:28:26.745000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:28:26.744000 audit[1953]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0001143c0 a2=fc6 a3=0 items=0 ppid=1804 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c591,c683 key=(null) Dec 13 14:28:26.744000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:28:27.079900 kubelet[2075]: E1213 14:28:27.079744 2075 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:27.921606 kubelet[2075]: E1213 14:28:27.921573 2075 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:28.037492 update_engine[1223]: I1213 14:28:28.037424 1223 update_attempter.cc:509] Updating boot flags... Dec 13 14:28:29.675604 kubelet[2075]: I1213 14:28:29.675562 2075 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Dec 13 14:28:29.676058 env[1231]: time="2024-12-13T14:28:29.675897299Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 14:28:29.676291 kubelet[2075]: I1213 14:28:29.676088 2075 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Dec 13 14:28:30.680931 kubelet[2075]: I1213 14:28:30.680874 2075 topology_manager.go:215] "Topology Admit Handler" podUID="85e0d724-26d5-40c8-9792-039fbedfd395" podNamespace="tigera-operator" podName="tigera-operator-c7ccbd65-hqgrm" Dec 13 14:28:30.686788 systemd[1]: Created slice kubepods-besteffort-pod85e0d724_26d5_40c8_9792_039fbedfd395.slice. Dec 13 14:28:30.711562 kubelet[2075]: I1213 14:28:30.711501 2075 topology_manager.go:215] "Topology Admit Handler" podUID="aa11d3f1-727a-46de-9474-7278c88619de" podNamespace="kube-system" podName="kube-proxy-bdc9g" Dec 13 14:28:30.717567 systemd[1]: Created slice kubepods-besteffort-podaa11d3f1_727a_46de_9474_7278c88619de.slice. Dec 13 14:28:30.782429 kubelet[2075]: I1213 14:28:30.782350 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/85e0d724-26d5-40c8-9792-039fbedfd395-var-lib-calico\") pod \"tigera-operator-c7ccbd65-hqgrm\" (UID: \"85e0d724-26d5-40c8-9792-039fbedfd395\") " pod="tigera-operator/tigera-operator-c7ccbd65-hqgrm" Dec 13 14:28:30.782429 kubelet[2075]: I1213 14:28:30.782406 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/aa11d3f1-727a-46de-9474-7278c88619de-xtables-lock\") pod \"kube-proxy-bdc9g\" (UID: \"aa11d3f1-727a-46de-9474-7278c88619de\") " pod="kube-system/kube-proxy-bdc9g" Dec 13 14:28:30.782429 kubelet[2075]: I1213 14:28:30.782433 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/aa11d3f1-727a-46de-9474-7278c88619de-kube-proxy\") pod \"kube-proxy-bdc9g\" (UID: \"aa11d3f1-727a-46de-9474-7278c88619de\") " pod="kube-system/kube-proxy-bdc9g" Dec 13 14:28:30.782429 kubelet[2075]: I1213 14:28:30.782450 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/aa11d3f1-727a-46de-9474-7278c88619de-lib-modules\") pod \"kube-proxy-bdc9g\" (UID: \"aa11d3f1-727a-46de-9474-7278c88619de\") " pod="kube-system/kube-proxy-bdc9g" Dec 13 14:28:30.782727 kubelet[2075]: I1213 14:28:30.782470 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2g2qt\" (UniqueName: \"kubernetes.io/projected/85e0d724-26d5-40c8-9792-039fbedfd395-kube-api-access-2g2qt\") pod \"tigera-operator-c7ccbd65-hqgrm\" (UID: \"85e0d724-26d5-40c8-9792-039fbedfd395\") " pod="tigera-operator/tigera-operator-c7ccbd65-hqgrm" Dec 13 14:28:30.782727 kubelet[2075]: I1213 14:28:30.782514 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-t9zl9\" (UniqueName: \"kubernetes.io/projected/aa11d3f1-727a-46de-9474-7278c88619de-kube-api-access-t9zl9\") pod \"kube-proxy-bdc9g\" (UID: \"aa11d3f1-727a-46de-9474-7278c88619de\") " pod="kube-system/kube-proxy-bdc9g" Dec 13 14:28:30.994895 env[1231]: time="2024-12-13T14:28:30.994743926Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-c7ccbd65-hqgrm,Uid:85e0d724-26d5-40c8-9792-039fbedfd395,Namespace:tigera-operator,Attempt:0,}" Dec 13 14:28:31.020028 kubelet[2075]: E1213 14:28:31.019971 2075 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:31.020704 env[1231]: time="2024-12-13T14:28:31.020640776Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-bdc9g,Uid:aa11d3f1-727a-46de-9474-7278c88619de,Namespace:kube-system,Attempt:0,}" Dec 13 14:28:31.086313 env[1231]: time="2024-12-13T14:28:31.086137335Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:28:31.086313 env[1231]: time="2024-12-13T14:28:31.086208250Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:28:31.086313 env[1231]: time="2024-12-13T14:28:31.086222420Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:28:31.086602 env[1231]: time="2024-12-13T14:28:31.086382911Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4a4bfe90eb64e6170a144b27ac2e841e35a9651c4963d6b492b3e7ce98cebc0c pid=2188 runtime=io.containerd.runc.v2 Dec 13 14:28:31.104194 env[1231]: time="2024-12-13T14:28:31.103793060Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:28:31.105002 env[1231]: time="2024-12-13T14:28:31.103871371Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:28:31.105002 env[1231]: time="2024-12-13T14:28:31.104858229Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:28:31.106957 env[1231]: time="2024-12-13T14:28:31.105279790Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7c6b441686cebd5172fabcfe9b7a195a53a9dbf1a37f7ca0fe0ea38266aaa63e pid=2212 runtime=io.containerd.runc.v2 Dec 13 14:28:31.108552 systemd[1]: Started cri-containerd-4a4bfe90eb64e6170a144b27ac2e841e35a9651c4963d6b492b3e7ce98cebc0c.scope. Dec 13 14:28:31.117369 kubelet[2075]: E1213 14:28:31.117325 2075 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:31.127163 kernel: kauditd_printk_skb: 5 callbacks suppressed Dec 13 14:28:31.127362 kernel: audit: type=1400 audit(1734100111.122:805): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.134842 kernel: audit: type=1400 audit(1734100111.122:806): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.134942 kernel: audit: type=1400 audit(1734100111.122:807): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.133996 systemd[1]: Started cri-containerd-7c6b441686cebd5172fabcfe9b7a195a53a9dbf1a37f7ca0fe0ea38266aaa63e.scope. Dec 13 14:28:31.140313 kernel: audit: type=1400 audit(1734100111.122:808): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.149643 kernel: audit: type=1400 audit(1734100111.122:809): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.149800 kernel: audit: type=1400 audit(1734100111.122:810): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.149840 kernel: audit: type=1400 audit(1734100111.122:811): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.153102 kernel: audit: type=1400 audit(1734100111.122:812): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.159922 kernel: audit: type=1400 audit(1734100111.122:813): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.165119 kernel: audit: type=1400 audit(1734100111.127:814): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.127000 audit: BPF prog-id=103 op=LOAD Dec 13 14:28:31.130000 audit[2199]: AVC avc: denied { bpf } for pid=2199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.130000 audit[2199]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2188 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461346266653930656236346536313730613134346232376163326538 Dec 13 14:28:31.130000 audit[2199]: AVC avc: denied { perfmon } for pid=2199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.130000 audit[2199]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2188 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461346266653930656236346536313730613134346232376163326538 Dec 13 14:28:31.130000 audit[2199]: AVC avc: denied { bpf } for pid=2199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.130000 audit[2199]: AVC avc: denied { bpf } for pid=2199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.130000 audit[2199]: AVC avc: denied { bpf } for pid=2199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.130000 audit[2199]: AVC avc: denied { perfmon } for pid=2199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.130000 audit[2199]: AVC avc: denied { perfmon } for pid=2199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.130000 audit[2199]: AVC avc: denied { perfmon } for pid=2199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.130000 audit[2199]: AVC avc: denied { perfmon } for pid=2199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.130000 audit[2199]: AVC avc: denied { perfmon } for pid=2199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.130000 audit[2199]: AVC avc: denied { bpf } for pid=2199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.130000 audit[2199]: AVC avc: denied { bpf } for pid=2199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.130000 audit: BPF prog-id=104 op=LOAD Dec 13 14:28:31.130000 audit[2199]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000204450 items=0 ppid=2188 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461346266653930656236346536313730613134346232376163326538 Dec 13 14:28:31.131000 audit[2199]: AVC avc: denied { bpf } for pid=2199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.131000 audit[2199]: AVC avc: denied { bpf } for pid=2199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.131000 audit[2199]: AVC avc: denied { perfmon } for pid=2199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.131000 audit[2199]: AVC avc: denied { perfmon } for pid=2199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.131000 audit[2199]: AVC avc: denied { perfmon } for pid=2199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.131000 audit[2199]: AVC avc: denied { perfmon } for pid=2199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.131000 audit[2199]: AVC avc: denied { perfmon } for pid=2199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.131000 audit[2199]: AVC avc: denied { bpf } for pid=2199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.131000 audit[2199]: AVC avc: denied { bpf } for pid=2199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.131000 audit: BPF prog-id=105 op=LOAD Dec 13 14:28:31.131000 audit[2199]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000204498 items=0 ppid=2188 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.131000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461346266653930656236346536313730613134346232376163326538 Dec 13 14:28:31.139000 audit: BPF prog-id=105 op=UNLOAD Dec 13 14:28:31.139000 audit: BPF prog-id=104 op=UNLOAD Dec 13 14:28:31.139000 audit[2199]: AVC avc: denied { bpf } for pid=2199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.139000 audit[2199]: AVC avc: denied { bpf } for pid=2199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.139000 audit[2199]: AVC avc: denied { bpf } for pid=2199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.139000 audit[2199]: AVC avc: denied { perfmon } for pid=2199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.139000 audit[2199]: AVC avc: denied { perfmon } for pid=2199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.139000 audit[2199]: AVC avc: denied { perfmon } for pid=2199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.139000 audit[2199]: AVC avc: denied { perfmon } for pid=2199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.139000 audit[2199]: AVC avc: denied { perfmon } for pid=2199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.139000 audit[2199]: AVC avc: denied { bpf } for pid=2199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.139000 audit[2199]: AVC avc: denied { bpf } for pid=2199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.139000 audit: BPF prog-id=106 op=LOAD Dec 13 14:28:31.139000 audit[2199]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002048a8 items=0 ppid=2188 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461346266653930656236346536313730613134346232376163326538 Dec 13 14:28:31.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.155000 audit: BPF prog-id=107 op=LOAD Dec 13 14:28:31.159000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.159000 audit[2231]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2212 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.159000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763366234343136383663656264353137326661626366653962376131 Dec 13 14:28:31.167000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.167000 audit[2231]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2212 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.167000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763366234343136383663656264353137326661626366653962376131 Dec 13 14:28:31.168000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.168000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.168000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.168000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.168000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.168000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.168000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.168000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.168000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.168000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.168000 audit: BPF prog-id=108 op=LOAD Dec 13 14:28:31.168000 audit[2231]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00028e320 items=0 ppid=2212 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.168000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763366234343136383663656264353137326661626366653962376131 Dec 13 14:28:31.169000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.169000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.169000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.169000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.169000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.169000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.169000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.169000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.169000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.169000 audit: BPF prog-id=109 op=LOAD Dec 13 14:28:31.169000 audit[2231]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00028e368 items=0 ppid=2212 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.169000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763366234343136383663656264353137326661626366653962376131 Dec 13 14:28:31.169000 audit: BPF prog-id=109 op=UNLOAD Dec 13 14:28:31.170000 audit: BPF prog-id=108 op=UNLOAD Dec 13 14:28:31.170000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.170000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.170000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.170000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.170000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.170000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.170000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.170000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.170000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.170000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.170000 audit: BPF prog-id=110 op=LOAD Dec 13 14:28:31.170000 audit[2231]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00028e778 items=0 ppid=2212 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.170000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763366234343136383663656264353137326661626366653962376131 Dec 13 14:28:31.183684 env[1231]: time="2024-12-13T14:28:31.183636380Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-bdc9g,Uid:aa11d3f1-727a-46de-9474-7278c88619de,Namespace:kube-system,Attempt:0,} returns sandbox id \"7c6b441686cebd5172fabcfe9b7a195a53a9dbf1a37f7ca0fe0ea38266aaa63e\"" Dec 13 14:28:31.184583 kubelet[2075]: E1213 14:28:31.184554 2075 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:31.187691 env[1231]: time="2024-12-13T14:28:31.187655980Z" level=info msg="CreateContainer within sandbox \"7c6b441686cebd5172fabcfe9b7a195a53a9dbf1a37f7ca0fe0ea38266aaa63e\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 14:28:31.194496 env[1231]: time="2024-12-13T14:28:31.194429967Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-c7ccbd65-hqgrm,Uid:85e0d724-26d5-40c8-9792-039fbedfd395,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"4a4bfe90eb64e6170a144b27ac2e841e35a9651c4963d6b492b3e7ce98cebc0c\"" Dec 13 14:28:31.197836 env[1231]: time="2024-12-13T14:28:31.197768700Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Dec 13 14:28:31.223895 env[1231]: time="2024-12-13T14:28:31.223741109Z" level=info msg="CreateContainer within sandbox \"7c6b441686cebd5172fabcfe9b7a195a53a9dbf1a37f7ca0fe0ea38266aaa63e\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"89dd872bd9f1baa1fb8cee232a14bc96c58dc0b04fa8da15431c5223161bc620\"" Dec 13 14:28:31.225324 env[1231]: time="2024-12-13T14:28:31.224714319Z" level=info msg="StartContainer for \"89dd872bd9f1baa1fb8cee232a14bc96c58dc0b04fa8da15431c5223161bc620\"" Dec 13 14:28:31.245975 systemd[1]: Started cri-containerd-89dd872bd9f1baa1fb8cee232a14bc96c58dc0b04fa8da15431c5223161bc620.scope. Dec 13 14:28:31.262000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.262000 audit[2263]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f8474dd0a18 items=0 ppid=2212 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.262000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839646438373262643966316261613166623863656532333261313462 Dec 13 14:28:31.262000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.262000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.262000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.262000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.262000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.262000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.262000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.262000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.262000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.262000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.262000 audit: BPF prog-id=111 op=LOAD Dec 13 14:28:31.262000 audit[2263]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000dfba8 items=0 ppid=2212 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.262000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839646438373262643966316261613166623863656532333261313462 Dec 13 14:28:31.263000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.263000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.263000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.263000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.263000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.263000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.263000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.263000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.263000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.263000 audit: BPF prog-id=112 op=LOAD Dec 13 14:28:31.263000 audit[2263]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000dfbf8 items=0 ppid=2212 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.263000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839646438373262643966316261613166623863656532333261313462 Dec 13 14:28:31.264000 audit: BPF prog-id=112 op=UNLOAD Dec 13 14:28:31.264000 audit: BPF prog-id=111 op=UNLOAD Dec 13 14:28:31.264000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.264000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.264000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.264000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.264000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.264000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.264000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.264000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.264000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.264000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:31.264000 audit: BPF prog-id=113 op=LOAD Dec 13 14:28:31.264000 audit[2263]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000dfc88 items=0 ppid=2212 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.264000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839646438373262643966316261613166623863656532333261313462 Dec 13 14:28:31.283059 env[1231]: time="2024-12-13T14:28:31.282994315Z" level=info msg="StartContainer for \"89dd872bd9f1baa1fb8cee232a14bc96c58dc0b04fa8da15431c5223161bc620\" returns successfully" Dec 13 14:28:31.353000 audit[2317]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2317 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:31.353000 audit[2317]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcf745f560 a2=0 a3=7ffcf745f54c items=0 ppid=2274 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.353000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:28:31.353000 audit[2318]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2318 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:31.353000 audit[2318]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc1c313550 a2=0 a3=7ffc1c31353c items=0 ppid=2274 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.353000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:28:31.354000 audit[2320]: NETFILTER_CFG table=nat:40 family=10 entries=1 op=nft_register_chain pid=2320 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:31.354000 audit[2320]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeab0feee0 a2=0 a3=7ffeab0feecc items=0 ppid=2274 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.354000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:28:31.355000 audit[2319]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_chain pid=2319 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:31.355000 audit[2319]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd1dff2f90 a2=0 a3=7ffd1dff2f7c items=0 ppid=2274 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.355000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:28:31.356000 audit[2321]: NETFILTER_CFG table=filter:42 family=10 entries=1 op=nft_register_chain pid=2321 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:31.356000 audit[2321]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe60fe1d20 a2=0 a3=7ffe60fe1d0c items=0 ppid=2274 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.356000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:28:31.356000 audit[2322]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2322 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:31.356000 audit[2322]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc52802780 a2=0 a3=7ffc5280276c items=0 ppid=2274 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.356000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:28:31.456000 audit[2323]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2323 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:31.456000 audit[2323]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffffd7dd350 a2=0 a3=7ffffd7dd33c items=0 ppid=2274 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.456000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:28:31.459000 audit[2325]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2325 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:31.459000 audit[2325]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffdca2ef350 a2=0 a3=7ffdca2ef33c items=0 ppid=2274 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.459000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 14:28:31.463000 audit[2328]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2328 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:31.463000 audit[2328]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff6d2f6ae0 a2=0 a3=7fff6d2f6acc items=0 ppid=2274 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.463000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 14:28:31.464000 audit[2329]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2329 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:31.464000 audit[2329]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcc4dadac0 a2=0 a3=7ffcc4dadaac items=0 ppid=2274 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.464000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:28:31.467000 audit[2331]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2331 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:31.467000 audit[2331]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe8e849020 a2=0 a3=7ffe8e84900c items=0 ppid=2274 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.467000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:28:31.468000 audit[2332]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2332 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:31.468000 audit[2332]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe6ab2ac90 a2=0 a3=7ffe6ab2ac7c items=0 ppid=2274 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.468000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:28:31.470000 audit[2334]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2334 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:31.470000 audit[2334]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd3c63d000 a2=0 a3=7ffd3c63cfec items=0 ppid=2274 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.470000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:28:31.473000 audit[2337]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2337 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:31.473000 audit[2337]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff59d741a0 a2=0 a3=7fff59d7418c items=0 ppid=2274 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.473000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 14:28:31.474000 audit[2338]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2338 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:31.474000 audit[2338]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffddfadc450 a2=0 a3=7ffddfadc43c items=0 ppid=2274 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.474000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:28:31.477000 audit[2340]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2340 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:31.477000 audit[2340]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcb26b9050 a2=0 a3=7ffcb26b903c items=0 ppid=2274 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.477000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:28:31.478000 audit[2341]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2341 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:31.478000 audit[2341]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd6d9bb990 a2=0 a3=7ffd6d9bb97c items=0 ppid=2274 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.478000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:28:31.480000 audit[2343]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2343 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:31.480000 audit[2343]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc28c97d80 a2=0 a3=7ffc28c97d6c items=0 ppid=2274 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.480000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:28:31.483000 audit[2346]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2346 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:31.483000 audit[2346]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffcfcc6d80 a2=0 a3=7fffcfcc6d6c items=0 ppid=2274 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.483000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:28:31.488000 audit[2349]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2349 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:31.488000 audit[2349]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffde956a840 a2=0 a3=7ffde956a82c items=0 ppid=2274 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.488000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:28:31.489000 audit[2350]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2350 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:31.489000 audit[2350]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffea131d540 a2=0 a3=7ffea131d52c items=0 ppid=2274 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.489000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:28:31.491000 audit[2352]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2352 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:31.491000 audit[2352]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffc51241190 a2=0 a3=7ffc5124117c items=0 ppid=2274 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.491000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:28:31.494000 audit[2355]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2355 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:31.494000 audit[2355]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff66d16a10 a2=0 a3=7fff66d169fc items=0 ppid=2274 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.494000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:28:31.496000 audit[2356]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2356 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:31.496000 audit[2356]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc14fa3b50 a2=0 a3=7ffc14fa3b3c items=0 ppid=2274 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.496000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:28:31.498000 audit[2358]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2358 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:28:31.498000 audit[2358]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffd686fcf70 a2=0 a3=7ffd686fcf5c items=0 ppid=2274 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.498000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:28:31.525000 audit[2364]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2364 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:28:31.525000 audit[2364]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffcb577ab10 a2=0 a3=7ffcb577aafc items=0 ppid=2274 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.525000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:28:31.534000 audit[2364]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2364 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:28:31.534000 audit[2364]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffcb577ab10 a2=0 a3=7ffcb577aafc items=0 ppid=2274 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.534000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:28:31.536000 audit[2370]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2370 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:31.536000 audit[2370]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff6102bd20 a2=0 a3=7fff6102bd0c items=0 ppid=2274 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.536000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:28:31.538000 audit[2372]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2372 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:31.538000 audit[2372]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd1942ad70 a2=0 a3=7ffd1942ad5c items=0 ppid=2274 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.538000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 14:28:31.542000 audit[2375]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2375 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:31.542000 audit[2375]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffeaed01e60 a2=0 a3=7ffeaed01e4c items=0 ppid=2274 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.542000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 14:28:31.543000 audit[2376]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2376 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:31.543000 audit[2376]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd6c14cf00 a2=0 a3=7ffd6c14ceec items=0 ppid=2274 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.543000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:28:31.545000 audit[2378]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2378 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:31.545000 audit[2378]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe46999b80 a2=0 a3=7ffe46999b6c items=0 ppid=2274 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.545000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:28:31.546000 audit[2379]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2379 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:31.546000 audit[2379]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcc048c510 a2=0 a3=7ffcc048c4fc items=0 ppid=2274 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.546000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:28:31.548000 audit[2381]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2381 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:31.548000 audit[2381]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffeba6e61b0 a2=0 a3=7ffeba6e619c items=0 ppid=2274 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.548000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 14:28:31.551000 audit[2384]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2384 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:31.551000 audit[2384]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd46693800 a2=0 a3=7ffd466937ec items=0 ppid=2274 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.551000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:28:31.552000 audit[2385]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2385 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:31.552000 audit[2385]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe695cd600 a2=0 a3=7ffe695cd5ec items=0 ppid=2274 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.552000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:28:31.555000 audit[2387]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2387 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:31.555000 audit[2387]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd50defd00 a2=0 a3=7ffd50defcec items=0 ppid=2274 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.555000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:28:31.556000 audit[2388]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2388 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:31.556000 audit[2388]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcfc0451e0 a2=0 a3=7ffcfc0451cc items=0 ppid=2274 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.556000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:28:31.558000 audit[2390]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2390 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:31.558000 audit[2390]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe2ea0b390 a2=0 a3=7ffe2ea0b37c items=0 ppid=2274 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.558000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:28:31.561000 audit[2393]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2393 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:31.561000 audit[2393]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcc68e9650 a2=0 a3=7ffcc68e963c items=0 ppid=2274 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.561000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:28:31.564000 audit[2396]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2396 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:31.564000 audit[2396]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc0917d610 a2=0 a3=7ffc0917d5fc items=0 ppid=2274 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.564000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 14:28:31.565000 audit[2397]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2397 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:31.565000 audit[2397]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe241fe710 a2=0 a3=7ffe241fe6fc items=0 ppid=2274 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.565000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:28:31.567000 audit[2399]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2399 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:31.567000 audit[2399]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffeee199a70 a2=0 a3=7ffeee199a5c items=0 ppid=2274 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.567000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:28:31.570000 audit[2402]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2402 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:31.570000 audit[2402]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe6d41c3a0 a2=0 a3=7ffe6d41c38c items=0 ppid=2274 pid=2402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.570000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:28:31.571000 audit[2403]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2403 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:31.571000 audit[2403]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc5dc8a590 a2=0 a3=7ffc5dc8a57c items=0 ppid=2274 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.571000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:28:31.573000 audit[2405]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2405 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:31.573000 audit[2405]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fffd4118380 a2=0 a3=7fffd411836c items=0 ppid=2274 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.573000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:28:31.574000 audit[2406]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2406 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:31.574000 audit[2406]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcdb1085c0 a2=0 a3=7ffcdb1085ac items=0 ppid=2274 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.574000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:28:31.576000 audit[2408]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2408 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:31.576000 audit[2408]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd7d972390 a2=0 a3=7ffd7d97237c items=0 ppid=2274 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.576000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:28:31.579000 audit[2411]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2411 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:28:31.579000 audit[2411]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcdde88c80 a2=0 a3=7ffcdde88c6c items=0 ppid=2274 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.579000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:28:31.582000 audit[2413]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2413 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:28:31.582000 audit[2413]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffe9d04b330 a2=0 a3=7ffe9d04b31c items=0 ppid=2274 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.582000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:28:31.582000 audit[2413]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2413 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:28:31.582000 audit[2413]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffe9d04b330 a2=0 a3=7ffe9d04b31c items=0 ppid=2274 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:31.582000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:28:31.929741 kubelet[2075]: E1213 14:28:31.929696 2075 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:31.930726 kubelet[2075]: E1213 14:28:31.930708 2075 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:31.939046 kubelet[2075]: I1213 14:28:31.938999 2075 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-bdc9g" podStartSLOduration=1.938964685 podStartE2EDuration="1.938964685s" podCreationTimestamp="2024-12-13 14:28:30 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:28:31.93880747 +0000 UTC m=+15.127542825" watchObservedRunningTime="2024-12-13 14:28:31.938964685 +0000 UTC m=+15.127700050" Dec 13 14:28:33.245426 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3097449930.mount: Deactivated successfully. Dec 13 14:28:34.514528 env[1231]: time="2024-12-13T14:28:34.514466500Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:34.611263 env[1231]: time="2024-12-13T14:28:34.611186691Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:34.645128 env[1231]: time="2024-12-13T14:28:34.645084357Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:34.674429 env[1231]: time="2024-12-13T14:28:34.674340222Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:34.674960 env[1231]: time="2024-12-13T14:28:34.674912119Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346\"" Dec 13 14:28:34.680239 env[1231]: time="2024-12-13T14:28:34.680204476Z" level=info msg="CreateContainer within sandbox \"4a4bfe90eb64e6170a144b27ac2e841e35a9651c4963d6b492b3e7ce98cebc0c\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Dec 13 14:28:34.909913 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2576286850.mount: Deactivated successfully. Dec 13 14:28:34.918368 env[1231]: time="2024-12-13T14:28:34.918215598Z" level=info msg="CreateContainer within sandbox \"4a4bfe90eb64e6170a144b27ac2e841e35a9651c4963d6b492b3e7ce98cebc0c\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"a6151bdd97202cace9e762d1a5db5b5419be0dbb1b8636fe46340423a43f72fb\"" Dec 13 14:28:34.919127 env[1231]: time="2024-12-13T14:28:34.919029488Z" level=info msg="StartContainer for \"a6151bdd97202cace9e762d1a5db5b5419be0dbb1b8636fe46340423a43f72fb\"" Dec 13 14:28:34.939858 systemd[1]: Started cri-containerd-a6151bdd97202cace9e762d1a5db5b5419be0dbb1b8636fe46340423a43f72fb.scope. Dec 13 14:28:34.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:34.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:34.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:34.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:34.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:34.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:34.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:34.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:34.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:34.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:34.948000 audit: BPF prog-id=114 op=LOAD Dec 13 14:28:34.948000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:34.948000 audit[2421]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2188 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:34.948000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136313531626464393732303263616365396537363264316135646235 Dec 13 14:28:34.949000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:34.949000 audit[2421]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2188 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:34.949000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136313531626464393732303263616365396537363264316135646235 Dec 13 14:28:34.949000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:34.949000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:34.949000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:34.949000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:34.949000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:34.949000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:34.949000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:34.949000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:34.949000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:34.949000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:34.949000 audit: BPF prog-id=115 op=LOAD Dec 13 14:28:34.949000 audit[2421]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000202790 items=0 ppid=2188 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:34.949000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136313531626464393732303263616365396537363264316135646235 Dec 13 14:28:34.949000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:34.949000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:34.949000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:34.949000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:34.949000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:34.949000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:34.949000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:34.949000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:34.949000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:34.949000 audit: BPF prog-id=116 op=LOAD Dec 13 14:28:34.949000 audit[2421]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002027d8 items=0 ppid=2188 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:34.949000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136313531626464393732303263616365396537363264316135646235 Dec 13 14:28:34.949000 audit: BPF prog-id=116 op=UNLOAD Dec 13 14:28:34.949000 audit: BPF prog-id=115 op=UNLOAD Dec 13 14:28:34.949000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:34.949000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:34.949000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:34.949000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:34.949000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:34.949000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:34.949000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:34.949000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:34.949000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:34.949000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:34.949000 audit: BPF prog-id=117 op=LOAD Dec 13 14:28:34.949000 audit[2421]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000202be8 items=0 ppid=2188 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:34.949000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136313531626464393732303263616365396537363264316135646235 Dec 13 14:28:34.961538 env[1231]: time="2024-12-13T14:28:34.961488390Z" level=info msg="StartContainer for \"a6151bdd97202cace9e762d1a5db5b5419be0dbb1b8636fe46340423a43f72fb\" returns successfully" Dec 13 14:28:35.954938 kubelet[2075]: I1213 14:28:35.954889 2075 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-c7ccbd65-hqgrm" podStartSLOduration=2.47614363 podStartE2EDuration="5.95482261s" podCreationTimestamp="2024-12-13 14:28:30 +0000 UTC" firstStartedPulling="2024-12-13 14:28:31.196634779 +0000 UTC m=+14.385370134" lastFinishedPulling="2024-12-13 14:28:34.675313759 +0000 UTC m=+17.864049114" observedRunningTime="2024-12-13 14:28:35.954796036 +0000 UTC m=+19.143531401" watchObservedRunningTime="2024-12-13 14:28:35.95482261 +0000 UTC m=+19.143557965" Dec 13 14:28:38.123173 kernel: kauditd_printk_skb: 357 callbacks suppressed Dec 13 14:28:38.123386 kernel: audit: type=1325 audit(1734100118.109:916): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2457 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:28:38.123419 kernel: audit: type=1300 audit(1734100118.109:916): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff77f2ede0 a2=0 a3=7fff77f2edcc items=0 ppid=2274 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:38.109000 audit[2457]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2457 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:28:38.109000 audit[2457]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff77f2ede0 a2=0 a3=7fff77f2edcc items=0 ppid=2274 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:38.127357 kernel: audit: type=1327 audit(1734100118.109:916): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:28:38.109000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:28:38.128000 audit[2457]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2457 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:28:38.133132 kernel: audit: type=1325 audit(1734100118.128:917): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2457 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:28:38.128000 audit[2457]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff77f2ede0 a2=0 a3=0 items=0 ppid=2274 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:38.139129 kernel: audit: type=1300 audit(1734100118.128:917): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff77f2ede0 a2=0 a3=0 items=0 ppid=2274 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:38.128000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:28:38.143111 kernel: audit: type=1327 audit(1734100118.128:917): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:28:38.148000 audit[2459]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2459 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:28:38.148000 audit[2459]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffcbfe64a90 a2=0 a3=7ffcbfe64a7c items=0 ppid=2274 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:38.159102 kernel: audit: type=1325 audit(1734100118.148:918): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2459 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:28:38.159305 kernel: audit: type=1300 audit(1734100118.148:918): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffcbfe64a90 a2=0 a3=7ffcbfe64a7c items=0 ppid=2274 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:38.148000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:28:38.162544 kernel: audit: type=1327 audit(1734100118.148:918): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:28:38.164000 audit[2459]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2459 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:28:38.164000 audit[2459]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcbfe64a90 a2=0 a3=0 items=0 ppid=2274 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:38.169256 kernel: audit: type=1325 audit(1734100118.164:919): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2459 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:28:38.164000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:28:38.186594 kubelet[2075]: I1213 14:28:38.186539 2075 topology_manager.go:215] "Topology Admit Handler" podUID="2795e158-02aa-44b6-924b-2c0659026617" podNamespace="calico-system" podName="calico-typha-5d96f6c7fc-7f24b" Dec 13 14:28:38.192283 systemd[1]: Created slice kubepods-besteffort-pod2795e158_02aa_44b6_924b_2c0659026617.slice. Dec 13 14:28:38.239735 kubelet[2075]: I1213 14:28:38.239678 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-brn9p\" (UniqueName: \"kubernetes.io/projected/2795e158-02aa-44b6-924b-2c0659026617-kube-api-access-brn9p\") pod \"calico-typha-5d96f6c7fc-7f24b\" (UID: \"2795e158-02aa-44b6-924b-2c0659026617\") " pod="calico-system/calico-typha-5d96f6c7fc-7f24b" Dec 13 14:28:38.239735 kubelet[2075]: I1213 14:28:38.239735 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/2795e158-02aa-44b6-924b-2c0659026617-tigera-ca-bundle\") pod \"calico-typha-5d96f6c7fc-7f24b\" (UID: \"2795e158-02aa-44b6-924b-2c0659026617\") " pod="calico-system/calico-typha-5d96f6c7fc-7f24b" Dec 13 14:28:38.240030 kubelet[2075]: I1213 14:28:38.239763 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/2795e158-02aa-44b6-924b-2c0659026617-typha-certs\") pod \"calico-typha-5d96f6c7fc-7f24b\" (UID: \"2795e158-02aa-44b6-924b-2c0659026617\") " pod="calico-system/calico-typha-5d96f6c7fc-7f24b" Dec 13 14:28:38.247679 kubelet[2075]: I1213 14:28:38.247618 2075 topology_manager.go:215] "Topology Admit Handler" podUID="2bf706ac-7962-4ea0-94fa-3eae192f9b02" podNamespace="calico-system" podName="calico-node-5q62t" Dec 13 14:28:38.254523 systemd[1]: Created slice kubepods-besteffort-pod2bf706ac_7962_4ea0_94fa_3eae192f9b02.slice. Dec 13 14:28:38.341151 kubelet[2075]: I1213 14:28:38.340379 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/2bf706ac-7962-4ea0-94fa-3eae192f9b02-xtables-lock\") pod \"calico-node-5q62t\" (UID: \"2bf706ac-7962-4ea0-94fa-3eae192f9b02\") " pod="calico-system/calico-node-5q62t" Dec 13 14:28:38.341472 kubelet[2075]: I1213 14:28:38.341453 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/2bf706ac-7962-4ea0-94fa-3eae192f9b02-var-lib-calico\") pod \"calico-node-5q62t\" (UID: \"2bf706ac-7962-4ea0-94fa-3eae192f9b02\") " pod="calico-system/calico-node-5q62t" Dec 13 14:28:38.341583 kubelet[2075]: I1213 14:28:38.341569 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/2bf706ac-7962-4ea0-94fa-3eae192f9b02-cni-net-dir\") pod \"calico-node-5q62t\" (UID: \"2bf706ac-7962-4ea0-94fa-3eae192f9b02\") " pod="calico-system/calico-node-5q62t" Dec 13 14:28:38.341750 kubelet[2075]: I1213 14:28:38.341718 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/2bf706ac-7962-4ea0-94fa-3eae192f9b02-policysync\") pod \"calico-node-5q62t\" (UID: \"2bf706ac-7962-4ea0-94fa-3eae192f9b02\") " pod="calico-system/calico-node-5q62t" Dec 13 14:28:38.341750 kubelet[2075]: I1213 14:28:38.341761 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/2bf706ac-7962-4ea0-94fa-3eae192f9b02-flexvol-driver-host\") pod \"calico-node-5q62t\" (UID: \"2bf706ac-7962-4ea0-94fa-3eae192f9b02\") " pod="calico-system/calico-node-5q62t" Dec 13 14:28:38.341973 kubelet[2075]: I1213 14:28:38.341821 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/2bf706ac-7962-4ea0-94fa-3eae192f9b02-tigera-ca-bundle\") pod \"calico-node-5q62t\" (UID: \"2bf706ac-7962-4ea0-94fa-3eae192f9b02\") " pod="calico-system/calico-node-5q62t" Dec 13 14:28:38.341973 kubelet[2075]: I1213 14:28:38.341856 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jglnv\" (UniqueName: \"kubernetes.io/projected/2bf706ac-7962-4ea0-94fa-3eae192f9b02-kube-api-access-jglnv\") pod \"calico-node-5q62t\" (UID: \"2bf706ac-7962-4ea0-94fa-3eae192f9b02\") " pod="calico-system/calico-node-5q62t" Dec 13 14:28:38.341973 kubelet[2075]: I1213 14:28:38.341880 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/2bf706ac-7962-4ea0-94fa-3eae192f9b02-cni-bin-dir\") pod \"calico-node-5q62t\" (UID: \"2bf706ac-7962-4ea0-94fa-3eae192f9b02\") " pod="calico-system/calico-node-5q62t" Dec 13 14:28:38.341973 kubelet[2075]: I1213 14:28:38.341897 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/2bf706ac-7962-4ea0-94fa-3eae192f9b02-node-certs\") pod \"calico-node-5q62t\" (UID: \"2bf706ac-7962-4ea0-94fa-3eae192f9b02\") " pod="calico-system/calico-node-5q62t" Dec 13 14:28:38.341973 kubelet[2075]: I1213 14:28:38.341916 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/2bf706ac-7962-4ea0-94fa-3eae192f9b02-var-run-calico\") pod \"calico-node-5q62t\" (UID: \"2bf706ac-7962-4ea0-94fa-3eae192f9b02\") " pod="calico-system/calico-node-5q62t" Dec 13 14:28:38.342119 kubelet[2075]: I1213 14:28:38.341950 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/2bf706ac-7962-4ea0-94fa-3eae192f9b02-lib-modules\") pod \"calico-node-5q62t\" (UID: \"2bf706ac-7962-4ea0-94fa-3eae192f9b02\") " pod="calico-system/calico-node-5q62t" Dec 13 14:28:38.342119 kubelet[2075]: I1213 14:28:38.341986 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/2bf706ac-7962-4ea0-94fa-3eae192f9b02-cni-log-dir\") pod \"calico-node-5q62t\" (UID: \"2bf706ac-7962-4ea0-94fa-3eae192f9b02\") " pod="calico-system/calico-node-5q62t" Dec 13 14:28:38.359320 kubelet[2075]: I1213 14:28:38.359272 2075 topology_manager.go:215] "Topology Admit Handler" podUID="d48acee9-c06b-4aaa-a5e2-0d0779dceacf" podNamespace="calico-system" podName="csi-node-driver-tstdc" Dec 13 14:28:38.359573 kubelet[2075]: E1213 14:28:38.359536 2075 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tstdc" podUID="d48acee9-c06b-4aaa-a5e2-0d0779dceacf" Dec 13 14:28:38.442835 kubelet[2075]: I1213 14:28:38.442685 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/d48acee9-c06b-4aaa-a5e2-0d0779dceacf-kubelet-dir\") pod \"csi-node-driver-tstdc\" (UID: \"d48acee9-c06b-4aaa-a5e2-0d0779dceacf\") " pod="calico-system/csi-node-driver-tstdc" Dec 13 14:28:38.442835 kubelet[2075]: I1213 14:28:38.442736 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tx9pr\" (UniqueName: \"kubernetes.io/projected/d48acee9-c06b-4aaa-a5e2-0d0779dceacf-kube-api-access-tx9pr\") pod \"csi-node-driver-tstdc\" (UID: \"d48acee9-c06b-4aaa-a5e2-0d0779dceacf\") " pod="calico-system/csi-node-driver-tstdc" Dec 13 14:28:38.442835 kubelet[2075]: I1213 14:28:38.442825 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/d48acee9-c06b-4aaa-a5e2-0d0779dceacf-registration-dir\") pod \"csi-node-driver-tstdc\" (UID: \"d48acee9-c06b-4aaa-a5e2-0d0779dceacf\") " pod="calico-system/csi-node-driver-tstdc" Dec 13 14:28:38.443126 kubelet[2075]: I1213 14:28:38.442870 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/d48acee9-c06b-4aaa-a5e2-0d0779dceacf-varrun\") pod \"csi-node-driver-tstdc\" (UID: \"d48acee9-c06b-4aaa-a5e2-0d0779dceacf\") " pod="calico-system/csi-node-driver-tstdc" Dec 13 14:28:38.443126 kubelet[2075]: I1213 14:28:38.442888 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/d48acee9-c06b-4aaa-a5e2-0d0779dceacf-socket-dir\") pod \"csi-node-driver-tstdc\" (UID: \"d48acee9-c06b-4aaa-a5e2-0d0779dceacf\") " pod="calico-system/csi-node-driver-tstdc" Dec 13 14:28:38.450181 kubelet[2075]: E1213 14:28:38.450133 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:38.450321 kubelet[2075]: W1213 14:28:38.450182 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:38.450504 kubelet[2075]: E1213 14:28:38.450221 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:38.452447 kubelet[2075]: E1213 14:28:38.452418 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:38.452447 kubelet[2075]: W1213 14:28:38.452433 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:38.452447 kubelet[2075]: E1213 14:28:38.452448 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:38.456754 kubelet[2075]: E1213 14:28:38.456716 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:38.456754 kubelet[2075]: W1213 14:28:38.456743 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:38.456917 kubelet[2075]: E1213 14:28:38.456782 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:38.496390 kubelet[2075]: E1213 14:28:38.496343 2075 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:38.497326 env[1231]: time="2024-12-13T14:28:38.497262773Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5d96f6c7fc-7f24b,Uid:2795e158-02aa-44b6-924b-2c0659026617,Namespace:calico-system,Attempt:0,}" Dec 13 14:28:38.518059 env[1231]: time="2024-12-13T14:28:38.517984112Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:28:38.518059 env[1231]: time="2024-12-13T14:28:38.518031618Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:28:38.518059 env[1231]: time="2024-12-13T14:28:38.518041588Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:28:38.518327 env[1231]: time="2024-12-13T14:28:38.518249797Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/81195c154b5a9febe9a9b35f765d6ed37e0e8348de77f7211f19888390cd1cc4 pid=2474 runtime=io.containerd.runc.v2 Dec 13 14:28:38.529257 systemd[1]: Started cri-containerd-81195c154b5a9febe9a9b35f765d6ed37e0e8348de77f7211f19888390cd1cc4.scope. Dec 13 14:28:38.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.540000 audit: BPF prog-id=118 op=LOAD Dec 13 14:28:38.540000 audit[2484]: AVC avc: denied { bpf } for pid=2484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.540000 audit[2484]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000199c48 a2=10 a3=1c items=0 ppid=2474 pid=2484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:38.540000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831313935633135346235613966656265396139623335663736356436 Dec 13 14:28:38.541000 audit[2484]: AVC avc: denied { perfmon } for pid=2484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.541000 audit[2484]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001996b0 a2=3c a3=c items=0 ppid=2474 pid=2484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:38.541000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831313935633135346235613966656265396139623335663736356436 Dec 13 14:28:38.541000 audit[2484]: AVC avc: denied { bpf } for pid=2484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.541000 audit[2484]: AVC avc: denied { bpf } for pid=2484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.541000 audit[2484]: AVC avc: denied { bpf } for pid=2484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.541000 audit[2484]: AVC avc: denied { perfmon } for pid=2484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.541000 audit[2484]: AVC avc: denied { perfmon } for pid=2484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.541000 audit[2484]: AVC avc: denied { perfmon } for pid=2484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.541000 audit[2484]: AVC avc: denied { perfmon } for pid=2484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.541000 audit[2484]: AVC avc: denied { perfmon } for pid=2484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.541000 audit[2484]: AVC avc: denied { bpf } for pid=2484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.541000 audit[2484]: AVC avc: denied { bpf } for pid=2484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.541000 audit: BPF prog-id=119 op=LOAD Dec 13 14:28:38.541000 audit[2484]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001999d8 a2=78 a3=c0003e2290 items=0 ppid=2474 pid=2484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:38.541000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831313935633135346235613966656265396139623335663736356436 Dec 13 14:28:38.542000 audit[2484]: AVC avc: denied { bpf } for pid=2484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.542000 audit[2484]: AVC avc: denied { bpf } for pid=2484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.542000 audit[2484]: AVC avc: denied { perfmon } for pid=2484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.542000 audit[2484]: AVC avc: denied { perfmon } for pid=2484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.542000 audit[2484]: AVC avc: denied { perfmon } for pid=2484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.542000 audit[2484]: AVC avc: denied { perfmon } for pid=2484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.542000 audit[2484]: AVC avc: denied { perfmon } for pid=2484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.542000 audit[2484]: AVC avc: denied { bpf } for pid=2484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.543614 kubelet[2075]: E1213 14:28:38.543589 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:38.543614 kubelet[2075]: W1213 14:28:38.543611 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:38.543710 kubelet[2075]: E1213 14:28:38.543633 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:38.542000 audit[2484]: AVC avc: denied { bpf } for pid=2484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.542000 audit: BPF prog-id=120 op=LOAD Dec 13 14:28:38.542000 audit[2484]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000199770 a2=78 a3=c0003e22d8 items=0 ppid=2474 pid=2484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:38.542000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831313935633135346235613966656265396139623335663736356436 Dec 13 14:28:38.542000 audit: BPF prog-id=120 op=UNLOAD Dec 13 14:28:38.542000 audit: BPF prog-id=119 op=UNLOAD Dec 13 14:28:38.542000 audit[2484]: AVC avc: denied { bpf } for pid=2484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.542000 audit[2484]: AVC avc: denied { bpf } for pid=2484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.542000 audit[2484]: AVC avc: denied { bpf } for pid=2484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.542000 audit[2484]: AVC avc: denied { perfmon } for pid=2484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.542000 audit[2484]: AVC avc: denied { perfmon } for pid=2484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.542000 audit[2484]: AVC avc: denied { perfmon } for pid=2484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.542000 audit[2484]: AVC avc: denied { perfmon } for pid=2484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.542000 audit[2484]: AVC avc: denied { perfmon } for pid=2484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.542000 audit[2484]: AVC avc: denied { bpf } for pid=2484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.542000 audit[2484]: AVC avc: denied { bpf } for pid=2484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.542000 audit: BPF prog-id=121 op=LOAD Dec 13 14:28:38.542000 audit[2484]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000199c30 a2=78 a3=c0003e26e8 items=0 ppid=2474 pid=2484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:38.542000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831313935633135346235613966656265396139623335663736356436 Dec 13 14:28:38.545297 kubelet[2075]: E1213 14:28:38.543881 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:38.545297 kubelet[2075]: W1213 14:28:38.543891 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:38.545297 kubelet[2075]: E1213 14:28:38.543908 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:38.545297 kubelet[2075]: E1213 14:28:38.544145 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:38.545297 kubelet[2075]: W1213 14:28:38.544153 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:38.545297 kubelet[2075]: E1213 14:28:38.544191 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:38.545297 kubelet[2075]: E1213 14:28:38.544418 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:38.545297 kubelet[2075]: W1213 14:28:38.544434 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:38.545297 kubelet[2075]: E1213 14:28:38.544445 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:38.545297 kubelet[2075]: E1213 14:28:38.544642 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:38.545607 kubelet[2075]: W1213 14:28:38.544648 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:38.545607 kubelet[2075]: E1213 14:28:38.544660 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:38.545607 kubelet[2075]: E1213 14:28:38.544890 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:38.545607 kubelet[2075]: W1213 14:28:38.544898 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:38.545607 kubelet[2075]: E1213 14:28:38.544913 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:38.545607 kubelet[2075]: E1213 14:28:38.545090 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:38.545607 kubelet[2075]: W1213 14:28:38.545096 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:38.545607 kubelet[2075]: E1213 14:28:38.545109 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:38.545607 kubelet[2075]: E1213 14:28:38.545276 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:38.545607 kubelet[2075]: W1213 14:28:38.545282 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:38.545994 kubelet[2075]: E1213 14:28:38.545333 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:38.545994 kubelet[2075]: E1213 14:28:38.545457 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:38.545994 kubelet[2075]: W1213 14:28:38.545463 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:38.545994 kubelet[2075]: E1213 14:28:38.545505 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:38.545994 kubelet[2075]: E1213 14:28:38.545634 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:38.545994 kubelet[2075]: W1213 14:28:38.545643 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:38.545994 kubelet[2075]: E1213 14:28:38.545716 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:38.545994 kubelet[2075]: E1213 14:28:38.545800 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:38.545994 kubelet[2075]: W1213 14:28:38.545806 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:38.545994 kubelet[2075]: E1213 14:28:38.545880 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:38.546433 kubelet[2075]: E1213 14:28:38.545976 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:38.546433 kubelet[2075]: W1213 14:28:38.545981 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:38.546433 kubelet[2075]: E1213 14:28:38.546062 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:38.546433 kubelet[2075]: E1213 14:28:38.546199 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:38.546433 kubelet[2075]: W1213 14:28:38.546206 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:38.546433 kubelet[2075]: E1213 14:28:38.546219 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:38.546433 kubelet[2075]: E1213 14:28:38.546398 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:38.546433 kubelet[2075]: W1213 14:28:38.546404 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:38.546433 kubelet[2075]: E1213 14:28:38.546414 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:38.546715 kubelet[2075]: E1213 14:28:38.546572 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:38.546715 kubelet[2075]: W1213 14:28:38.546579 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:38.546715 kubelet[2075]: E1213 14:28:38.546588 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:38.546955 kubelet[2075]: E1213 14:28:38.546938 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:38.546955 kubelet[2075]: W1213 14:28:38.546950 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:38.547156 kubelet[2075]: E1213 14:28:38.547011 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:38.547156 kubelet[2075]: E1213 14:28:38.547140 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:38.547156 kubelet[2075]: W1213 14:28:38.547146 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:38.547286 kubelet[2075]: E1213 14:28:38.547225 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:38.547347 kubelet[2075]: E1213 14:28:38.547328 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:38.547347 kubelet[2075]: W1213 14:28:38.547338 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:38.547457 kubelet[2075]: E1213 14:28:38.547404 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:38.547673 kubelet[2075]: E1213 14:28:38.547632 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:38.547673 kubelet[2075]: W1213 14:28:38.547649 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:38.547769 kubelet[2075]: E1213 14:28:38.547716 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:38.547938 kubelet[2075]: E1213 14:28:38.547921 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:38.547938 kubelet[2075]: W1213 14:28:38.547933 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:38.548041 kubelet[2075]: E1213 14:28:38.547945 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:38.549802 kubelet[2075]: E1213 14:28:38.548409 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:38.549802 kubelet[2075]: W1213 14:28:38.548421 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:38.549802 kubelet[2075]: E1213 14:28:38.548431 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:38.549802 kubelet[2075]: E1213 14:28:38.548618 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:38.549802 kubelet[2075]: W1213 14:28:38.548624 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:38.549802 kubelet[2075]: E1213 14:28:38.548633 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:38.549802 kubelet[2075]: E1213 14:28:38.548830 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:38.549802 kubelet[2075]: W1213 14:28:38.548837 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:38.549802 kubelet[2075]: E1213 14:28:38.548917 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:38.549802 kubelet[2075]: E1213 14:28:38.549150 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:38.550599 kubelet[2075]: W1213 14:28:38.549156 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:38.550599 kubelet[2075]: E1213 14:28:38.549173 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:38.550599 kubelet[2075]: E1213 14:28:38.549415 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:38.550599 kubelet[2075]: W1213 14:28:38.549421 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:38.550599 kubelet[2075]: E1213 14:28:38.549441 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:38.558002 kubelet[2075]: E1213 14:28:38.557452 2075 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:38.558144 env[1231]: time="2024-12-13T14:28:38.558087504Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-5q62t,Uid:2bf706ac-7962-4ea0-94fa-3eae192f9b02,Namespace:calico-system,Attempt:0,}" Dec 13 14:28:38.559495 kubelet[2075]: E1213 14:28:38.559467 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:38.559495 kubelet[2075]: W1213 14:28:38.559487 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:38.559583 kubelet[2075]: E1213 14:28:38.559516 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:38.573384 env[1231]: time="2024-12-13T14:28:38.573326674Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5d96f6c7fc-7f24b,Uid:2795e158-02aa-44b6-924b-2c0659026617,Namespace:calico-system,Attempt:0,} returns sandbox id \"81195c154b5a9febe9a9b35f765d6ed37e0e8348de77f7211f19888390cd1cc4\"" Dec 13 14:28:38.574340 env[1231]: time="2024-12-13T14:28:38.574104931Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:28:38.574340 env[1231]: time="2024-12-13T14:28:38.574153228Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:28:38.574340 env[1231]: time="2024-12-13T14:28:38.574188889Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:28:38.575003 env[1231]: time="2024-12-13T14:28:38.574400004Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b5b42eda82b8c02525b057c175b4554dd42f33e624d5a9a59fe508104733fd2a pid=2542 runtime=io.containerd.runc.v2 Dec 13 14:28:38.575573 kubelet[2075]: E1213 14:28:38.575528 2075 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:38.578527 env[1231]: time="2024-12-13T14:28:38.577761064Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 14:28:38.589990 systemd[1]: Started cri-containerd-b5b42eda82b8c02525b057c175b4554dd42f33e624d5a9a59fe508104733fd2a.scope. Dec 13 14:28:38.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.600000 audit: BPF prog-id=122 op=LOAD Dec 13 14:28:38.601000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.601000 audit[2551]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2542 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:38.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235623432656461383262386330323532356230353763313735623435 Dec 13 14:28:38.601000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.601000 audit[2551]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2542 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:38.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235623432656461383262386330323532356230353763313735623435 Dec 13 14:28:38.601000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.601000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.601000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.601000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.601000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.601000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.601000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.601000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.601000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.601000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.601000 audit: BPF prog-id=123 op=LOAD Dec 13 14:28:38.601000 audit[2551]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0001dd980 items=0 ppid=2542 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:38.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235623432656461383262386330323532356230353763313735623435 Dec 13 14:28:38.601000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.601000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.601000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.601000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.601000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.601000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.601000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.601000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.601000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.601000 audit: BPF prog-id=124 op=LOAD Dec 13 14:28:38.601000 audit[2551]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0001dd9c8 items=0 ppid=2542 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:38.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235623432656461383262386330323532356230353763313735623435 Dec 13 14:28:38.601000 audit: BPF prog-id=124 op=UNLOAD Dec 13 14:28:38.601000 audit: BPF prog-id=123 op=UNLOAD Dec 13 14:28:38.601000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.601000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.601000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.601000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.601000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.601000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.601000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.601000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.601000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.601000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:38.601000 audit: BPF prog-id=125 op=LOAD Dec 13 14:28:38.601000 audit[2551]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0001dddd8 items=0 ppid=2542 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:38.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235623432656461383262386330323532356230353763313735623435 Dec 13 14:28:38.617637 env[1231]: time="2024-12-13T14:28:38.617579952Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-5q62t,Uid:2bf706ac-7962-4ea0-94fa-3eae192f9b02,Namespace:calico-system,Attempt:0,} returns sandbox id \"b5b42eda82b8c02525b057c175b4554dd42f33e624d5a9a59fe508104733fd2a\"" Dec 13 14:28:38.620334 kubelet[2075]: E1213 14:28:38.620210 2075 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:39.176000 audit[2575]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2575 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:28:39.176000 audit[2575]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffdfaac1a00 a2=0 a3=7ffdfaac19ec items=0 ppid=2274 pid=2575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:39.176000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:28:39.182000 audit[2575]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2575 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:28:39.182000 audit[2575]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdfaac1a00 a2=0 a3=0 items=0 ppid=2274 pid=2575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:39.182000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:28:39.901948 kubelet[2075]: E1213 14:28:39.901904 2075 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tstdc" podUID="d48acee9-c06b-4aaa-a5e2-0d0779dceacf" Dec 13 14:28:41.378154 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1432422369.mount: Deactivated successfully. Dec 13 14:28:41.901983 kubelet[2075]: E1213 14:28:41.901911 2075 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tstdc" podUID="d48acee9-c06b-4aaa-a5e2-0d0779dceacf" Dec 13 14:28:43.651437 env[1231]: time="2024-12-13T14:28:43.651358795Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:43.654195 env[1231]: time="2024-12-13T14:28:43.654121500Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:43.656526 env[1231]: time="2024-12-13T14:28:43.656479491Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:43.658535 env[1231]: time="2024-12-13T14:28:43.658480461Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:43.659041 env[1231]: time="2024-12-13T14:28:43.659000737Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\"" Dec 13 14:28:43.659800 env[1231]: time="2024-12-13T14:28:43.659770258Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 14:28:43.672872 env[1231]: time="2024-12-13T14:28:43.672815096Z" level=info msg="CreateContainer within sandbox \"81195c154b5a9febe9a9b35f765d6ed37e0e8348de77f7211f19888390cd1cc4\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 14:28:43.698595 env[1231]: time="2024-12-13T14:28:43.698529828Z" level=info msg="CreateContainer within sandbox \"81195c154b5a9febe9a9b35f765d6ed37e0e8348de77f7211f19888390cd1cc4\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"4a38b878a770dfc5934ea6f755fde56d3bd39707ff3435416b2c738b027cb416\"" Dec 13 14:28:43.699175 env[1231]: time="2024-12-13T14:28:43.699144211Z" level=info msg="StartContainer for \"4a38b878a770dfc5934ea6f755fde56d3bd39707ff3435416b2c738b027cb416\"" Dec 13 14:28:43.719590 systemd[1]: Started cri-containerd-4a38b878a770dfc5934ea6f755fde56d3bd39707ff3435416b2c738b027cb416.scope. Dec 13 14:28:43.738294 kernel: kauditd_printk_skb: 122 callbacks suppressed Dec 13 14:28:43.738429 kernel: audit: type=1400 audit(1734100123.732:958): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.738468 kernel: audit: type=1400 audit(1734100123.732:959): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.741115 kernel: audit: type=1400 audit(1734100123.732:960): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.747461 kernel: audit: type=1400 audit(1734100123.732:961): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.747538 kernel: audit: type=1400 audit(1734100123.732:962): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.769595 kernel: audit: type=1400 audit(1734100123.732:963): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.769650 kernel: audit: type=1400 audit(1734100123.732:964): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.784348 kernel: audit: type=1400 audit(1734100123.732:965): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.784429 kernel: audit: type=1400 audit(1734100123.732:966): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.790744 kernel: audit: type=1400 audit(1734100123.739:967): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.739000 audit: BPF prog-id=126 op=LOAD Dec 13 14:28:43.742000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.742000 audit[2587]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2474 pid=2587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:43.742000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461333862383738613737306466633539333465613666373535666465 Dec 13 14:28:43.742000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.742000 audit[2587]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2474 pid=2587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:43.742000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461333862383738613737306466633539333465613666373535666465 Dec 13 14:28:43.742000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.742000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.742000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.742000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.742000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.742000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.742000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.742000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.742000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.742000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.742000 audit: BPF prog-id=127 op=LOAD Dec 13 14:28:43.742000 audit[2587]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000324b70 items=0 ppid=2474 pid=2587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:43.742000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461333862383738613737306466633539333465613666373535666465 Dec 13 14:28:43.765000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.765000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.765000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.765000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.765000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.765000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.765000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.765000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.765000 audit[2587]: SYSCALL arch=c000003e syscall=321 success=no exit=-11 a0=5 a1=c000145770 a2=78 a3=c000324bb8 items=0 ppid=2474 pid=2587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:43.765000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461333862383738613737306466633539333465613666373535666465 Dec 13 14:28:43.765000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.765000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.765000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.765000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.765000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.765000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.765000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.765000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.765000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.765000 audit: BPF prog-id=128 op=LOAD Dec 13 14:28:43.765000 audit[2587]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=1 items=0 ppid=2474 pid=2587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:43.765000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461333862383738613737306466633539333465613666373535666465 Dec 13 14:28:43.779000 audit: BPF prog-id=128 op=UNLOAD Dec 13 14:28:43.783000 audit: BPF prog-id=127 op=UNLOAD Dec 13 14:28:43.783000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.783000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.783000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.783000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.783000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.783000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.783000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.783000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.783000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.783000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:43.783000 audit: BPF prog-id=129 op=LOAD Dec 13 14:28:43.783000 audit[2587]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000324fc8 items=0 ppid=2474 pid=2587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:43.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461333862383738613737306466633539333465613666373535666465 Dec 13 14:28:43.901881 kubelet[2075]: E1213 14:28:43.901736 2075 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tstdc" podUID="d48acee9-c06b-4aaa-a5e2-0d0779dceacf" Dec 13 14:28:43.913768 env[1231]: time="2024-12-13T14:28:43.913705041Z" level=info msg="StartContainer for \"4a38b878a770dfc5934ea6f755fde56d3bd39707ff3435416b2c738b027cb416\" returns successfully" Dec 13 14:28:43.964682 kubelet[2075]: E1213 14:28:43.964639 2075 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:43.984299 kubelet[2075]: I1213 14:28:43.984233 2075 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-5d96f6c7fc-7f24b" podStartSLOduration=0.901985906 podStartE2EDuration="5.984183419s" podCreationTimestamp="2024-12-13 14:28:38 +0000 UTC" firstStartedPulling="2024-12-13 14:28:38.577185835 +0000 UTC m=+21.765921190" lastFinishedPulling="2024-12-13 14:28:43.659383348 +0000 UTC m=+26.848118703" observedRunningTime="2024-12-13 14:28:43.982884374 +0000 UTC m=+27.171619759" watchObservedRunningTime="2024-12-13 14:28:43.984183419 +0000 UTC m=+27.172918774" Dec 13 14:28:44.050200 kubelet[2075]: E1213 14:28:44.050147 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:44.050200 kubelet[2075]: W1213 14:28:44.050174 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:44.050200 kubelet[2075]: E1213 14:28:44.050196 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:44.050527 kubelet[2075]: E1213 14:28:44.050505 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:44.050527 kubelet[2075]: W1213 14:28:44.050520 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:44.050625 kubelet[2075]: E1213 14:28:44.050535 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:44.050799 kubelet[2075]: E1213 14:28:44.050777 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:44.050799 kubelet[2075]: W1213 14:28:44.050790 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:44.050799 kubelet[2075]: E1213 14:28:44.050803 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:44.051039 kubelet[2075]: E1213 14:28:44.051022 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:44.051039 kubelet[2075]: W1213 14:28:44.051034 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:44.051149 kubelet[2075]: E1213 14:28:44.051051 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:44.051295 kubelet[2075]: E1213 14:28:44.051273 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:44.051295 kubelet[2075]: W1213 14:28:44.051289 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:44.051384 kubelet[2075]: E1213 14:28:44.051303 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:44.051529 kubelet[2075]: E1213 14:28:44.051505 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:44.051529 kubelet[2075]: W1213 14:28:44.051520 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:44.051588 kubelet[2075]: E1213 14:28:44.051533 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:44.051746 kubelet[2075]: E1213 14:28:44.051716 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:44.051746 kubelet[2075]: W1213 14:28:44.051742 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:44.051821 kubelet[2075]: E1213 14:28:44.051759 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:44.051975 kubelet[2075]: E1213 14:28:44.051958 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:44.051975 kubelet[2075]: W1213 14:28:44.051971 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:44.052037 kubelet[2075]: E1213 14:28:44.051985 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:44.052196 kubelet[2075]: E1213 14:28:44.052177 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:44.052196 kubelet[2075]: W1213 14:28:44.052188 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:44.052196 kubelet[2075]: E1213 14:28:44.052197 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:44.052403 kubelet[2075]: E1213 14:28:44.052387 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:44.052403 kubelet[2075]: W1213 14:28:44.052397 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:44.052403 kubelet[2075]: E1213 14:28:44.052406 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:44.052577 kubelet[2075]: E1213 14:28:44.052559 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:44.052577 kubelet[2075]: W1213 14:28:44.052570 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:44.052577 kubelet[2075]: E1213 14:28:44.052581 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:44.052759 kubelet[2075]: E1213 14:28:44.052745 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:44.052759 kubelet[2075]: W1213 14:28:44.052754 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:44.052825 kubelet[2075]: E1213 14:28:44.052763 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:44.052933 kubelet[2075]: E1213 14:28:44.052919 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:44.052933 kubelet[2075]: W1213 14:28:44.052931 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:44.052981 kubelet[2075]: E1213 14:28:44.052942 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:44.053120 kubelet[2075]: E1213 14:28:44.053102 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:44.053120 kubelet[2075]: W1213 14:28:44.053111 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:44.053120 kubelet[2075]: E1213 14:28:44.053119 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:44.053282 kubelet[2075]: E1213 14:28:44.053268 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:44.053282 kubelet[2075]: W1213 14:28:44.053277 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:44.053361 kubelet[2075]: E1213 14:28:44.053287 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:44.079971 kubelet[2075]: E1213 14:28:44.079929 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:44.079971 kubelet[2075]: W1213 14:28:44.079955 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:44.079971 kubelet[2075]: E1213 14:28:44.079982 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:44.080322 kubelet[2075]: E1213 14:28:44.080286 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:44.080353 kubelet[2075]: W1213 14:28:44.080323 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:44.080379 kubelet[2075]: E1213 14:28:44.080355 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:44.080852 kubelet[2075]: E1213 14:28:44.080801 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:44.080852 kubelet[2075]: W1213 14:28:44.080823 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:44.080852 kubelet[2075]: E1213 14:28:44.080853 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:44.081241 kubelet[2075]: E1213 14:28:44.081217 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:44.081241 kubelet[2075]: W1213 14:28:44.081230 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:44.081333 kubelet[2075]: E1213 14:28:44.081252 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:44.081490 kubelet[2075]: E1213 14:28:44.081467 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:44.081490 kubelet[2075]: W1213 14:28:44.081478 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:44.081591 kubelet[2075]: E1213 14:28:44.081540 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:44.081721 kubelet[2075]: E1213 14:28:44.081705 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:44.081721 kubelet[2075]: W1213 14:28:44.081717 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:44.081823 kubelet[2075]: E1213 14:28:44.081770 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:44.081956 kubelet[2075]: E1213 14:28:44.081940 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:44.081956 kubelet[2075]: W1213 14:28:44.081952 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:44.082044 kubelet[2075]: E1213 14:28:44.081990 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:44.082192 kubelet[2075]: E1213 14:28:44.082177 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:44.082192 kubelet[2075]: W1213 14:28:44.082188 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:44.082280 kubelet[2075]: E1213 14:28:44.082212 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:44.082460 kubelet[2075]: E1213 14:28:44.082444 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:44.082460 kubelet[2075]: W1213 14:28:44.082455 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:44.082548 kubelet[2075]: E1213 14:28:44.082475 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:44.082862 kubelet[2075]: E1213 14:28:44.082837 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:44.082862 kubelet[2075]: W1213 14:28:44.082859 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:44.082966 kubelet[2075]: E1213 14:28:44.082888 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:44.083133 kubelet[2075]: E1213 14:28:44.083112 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:44.083192 kubelet[2075]: W1213 14:28:44.083130 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:44.083192 kubelet[2075]: E1213 14:28:44.083166 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:44.083422 kubelet[2075]: E1213 14:28:44.083403 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:44.083422 kubelet[2075]: W1213 14:28:44.083418 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:44.083525 kubelet[2075]: E1213 14:28:44.083469 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:44.083689 kubelet[2075]: E1213 14:28:44.083652 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:44.083689 kubelet[2075]: W1213 14:28:44.083670 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:44.083972 kubelet[2075]: E1213 14:28:44.083821 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:44.083972 kubelet[2075]: E1213 14:28:44.083887 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:44.083972 kubelet[2075]: W1213 14:28:44.083898 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:44.083972 kubelet[2075]: E1213 14:28:44.083913 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:44.084131 kubelet[2075]: E1213 14:28:44.084121 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:44.084181 kubelet[2075]: W1213 14:28:44.084132 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:44.084181 kubelet[2075]: E1213 14:28:44.084147 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:44.084375 kubelet[2075]: E1213 14:28:44.084347 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:44.084375 kubelet[2075]: W1213 14:28:44.084363 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:44.084375 kubelet[2075]: E1213 14:28:44.084380 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:44.084612 kubelet[2075]: E1213 14:28:44.084597 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:44.084672 kubelet[2075]: W1213 14:28:44.084611 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:44.084672 kubelet[2075]: E1213 14:28:44.084631 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:44.085049 kubelet[2075]: E1213 14:28:44.085027 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:44.085049 kubelet[2075]: W1213 14:28:44.085044 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:44.085158 kubelet[2075]: E1213 14:28:44.085062 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:44.965346 kubelet[2075]: I1213 14:28:44.965311 2075 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:28:44.965953 kubelet[2075]: E1213 14:28:44.965926 2075 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:45.062013 kubelet[2075]: E1213 14:28:45.061975 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:45.062013 kubelet[2075]: W1213 14:28:45.061998 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:45.062013 kubelet[2075]: E1213 14:28:45.062017 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:45.062274 kubelet[2075]: E1213 14:28:45.062250 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:45.062274 kubelet[2075]: W1213 14:28:45.062256 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:45.062274 kubelet[2075]: E1213 14:28:45.062265 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:45.062498 kubelet[2075]: E1213 14:28:45.062481 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:45.062498 kubelet[2075]: W1213 14:28:45.062495 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:45.062586 kubelet[2075]: E1213 14:28:45.062509 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:45.062752 kubelet[2075]: E1213 14:28:45.062716 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:45.062752 kubelet[2075]: W1213 14:28:45.062730 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:45.062752 kubelet[2075]: E1213 14:28:45.062743 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:45.063044 kubelet[2075]: E1213 14:28:45.062945 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:45.063044 kubelet[2075]: W1213 14:28:45.062952 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:45.063044 kubelet[2075]: E1213 14:28:45.062961 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:45.063165 kubelet[2075]: E1213 14:28:45.063134 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:45.063165 kubelet[2075]: W1213 14:28:45.063140 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:45.063165 kubelet[2075]: E1213 14:28:45.063149 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:45.063310 kubelet[2075]: E1213 14:28:45.063292 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:45.063310 kubelet[2075]: W1213 14:28:45.063301 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:45.063310 kubelet[2075]: E1213 14:28:45.063310 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:45.063476 kubelet[2075]: E1213 14:28:45.063461 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:45.063476 kubelet[2075]: W1213 14:28:45.063470 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:45.063476 kubelet[2075]: E1213 14:28:45.063478 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:45.063644 kubelet[2075]: E1213 14:28:45.063631 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:45.063644 kubelet[2075]: W1213 14:28:45.063640 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:45.063697 kubelet[2075]: E1213 14:28:45.063650 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:45.063808 kubelet[2075]: E1213 14:28:45.063797 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:45.063808 kubelet[2075]: W1213 14:28:45.063806 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:45.063870 kubelet[2075]: E1213 14:28:45.063825 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:45.063997 kubelet[2075]: E1213 14:28:45.063975 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:45.063997 kubelet[2075]: W1213 14:28:45.063995 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:45.064048 kubelet[2075]: E1213 14:28:45.064004 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:45.064175 kubelet[2075]: E1213 14:28:45.064164 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:45.064175 kubelet[2075]: W1213 14:28:45.064173 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:45.064302 kubelet[2075]: E1213 14:28:45.064183 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:45.064328 kubelet[2075]: E1213 14:28:45.064314 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:45.064328 kubelet[2075]: W1213 14:28:45.064320 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:45.064328 kubelet[2075]: E1213 14:28:45.064328 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:45.064473 kubelet[2075]: E1213 14:28:45.064460 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:45.064473 kubelet[2075]: W1213 14:28:45.064471 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:45.064530 kubelet[2075]: E1213 14:28:45.064481 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:45.064618 kubelet[2075]: E1213 14:28:45.064602 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:45.064618 kubelet[2075]: W1213 14:28:45.064611 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:45.064618 kubelet[2075]: E1213 14:28:45.064619 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:45.087472 kubelet[2075]: E1213 14:28:45.087404 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:45.087472 kubelet[2075]: W1213 14:28:45.087433 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:45.087472 kubelet[2075]: E1213 14:28:45.087453 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:45.087725 kubelet[2075]: E1213 14:28:45.087659 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:45.087725 kubelet[2075]: W1213 14:28:45.087669 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:45.087725 kubelet[2075]: E1213 14:28:45.087685 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:45.088053 kubelet[2075]: E1213 14:28:45.088020 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:45.088104 kubelet[2075]: W1213 14:28:45.088050 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:45.088138 kubelet[2075]: E1213 14:28:45.088113 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:45.088354 kubelet[2075]: E1213 14:28:45.088335 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:45.088354 kubelet[2075]: W1213 14:28:45.088350 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:45.088405 kubelet[2075]: E1213 14:28:45.088373 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:45.088596 kubelet[2075]: E1213 14:28:45.088565 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:45.088596 kubelet[2075]: W1213 14:28:45.088593 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:45.088646 kubelet[2075]: E1213 14:28:45.088617 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:45.088912 kubelet[2075]: E1213 14:28:45.088890 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:45.088912 kubelet[2075]: W1213 14:28:45.088905 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:45.088998 kubelet[2075]: E1213 14:28:45.088926 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:45.089289 kubelet[2075]: E1213 14:28:45.089270 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:45.089289 kubelet[2075]: W1213 14:28:45.089287 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:45.089371 kubelet[2075]: E1213 14:28:45.089308 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:45.089561 kubelet[2075]: E1213 14:28:45.089543 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:45.089561 kubelet[2075]: W1213 14:28:45.089556 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:45.089631 kubelet[2075]: E1213 14:28:45.089609 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:45.089767 kubelet[2075]: E1213 14:28:45.089740 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:45.089767 kubelet[2075]: W1213 14:28:45.089754 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:45.089834 kubelet[2075]: E1213 14:28:45.089808 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:45.089976 kubelet[2075]: E1213 14:28:45.089958 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:45.089976 kubelet[2075]: W1213 14:28:45.089972 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:45.090046 kubelet[2075]: E1213 14:28:45.089992 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:45.090251 kubelet[2075]: E1213 14:28:45.090228 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:45.090251 kubelet[2075]: W1213 14:28:45.090244 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:45.090304 kubelet[2075]: E1213 14:28:45.090263 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:45.090474 kubelet[2075]: E1213 14:28:45.090444 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:45.090474 kubelet[2075]: W1213 14:28:45.090458 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:45.090474 kubelet[2075]: E1213 14:28:45.090482 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:45.090740 kubelet[2075]: E1213 14:28:45.090688 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:45.090740 kubelet[2075]: W1213 14:28:45.090694 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:45.090740 kubelet[2075]: E1213 14:28:45.090709 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:45.091036 kubelet[2075]: E1213 14:28:45.091017 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:45.091176 kubelet[2075]: W1213 14:28:45.091035 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:45.091176 kubelet[2075]: E1213 14:28:45.091057 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:45.091301 kubelet[2075]: E1213 14:28:45.091285 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:45.091301 kubelet[2075]: W1213 14:28:45.091298 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:45.091389 kubelet[2075]: E1213 14:28:45.091318 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:45.091575 kubelet[2075]: E1213 14:28:45.091559 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:45.091575 kubelet[2075]: W1213 14:28:45.091570 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:45.091652 kubelet[2075]: E1213 14:28:45.091589 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:45.091811 kubelet[2075]: E1213 14:28:45.091790 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:45.091891 kubelet[2075]: W1213 14:28:45.091829 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:45.091891 kubelet[2075]: E1213 14:28:45.091850 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:45.092051 kubelet[2075]: E1213 14:28:45.092031 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:28:45.092051 kubelet[2075]: W1213 14:28:45.092044 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:28:45.092180 kubelet[2075]: E1213 14:28:45.092058 2075 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:28:45.901949 kubelet[2075]: E1213 14:28:45.901869 2075 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tstdc" podUID="d48acee9-c06b-4aaa-a5e2-0d0779dceacf" Dec 13 14:28:46.203900 env[1231]: time="2024-12-13T14:28:46.203641420Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:46.206428 env[1231]: time="2024-12-13T14:28:46.206363273Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:46.208540 env[1231]: time="2024-12-13T14:28:46.208490922Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:46.210531 env[1231]: time="2024-12-13T14:28:46.210480387Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:46.211249 env[1231]: time="2024-12-13T14:28:46.211201753Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 14:28:46.213561 env[1231]: time="2024-12-13T14:28:46.213026973Z" level=info msg="CreateContainer within sandbox \"b5b42eda82b8c02525b057c175b4554dd42f33e624d5a9a59fe508104733fd2a\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:28:46.234348 env[1231]: time="2024-12-13T14:28:46.234252134Z" level=info msg="CreateContainer within sandbox \"b5b42eda82b8c02525b057c175b4554dd42f33e624d5a9a59fe508104733fd2a\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"a33f110bb20cabc5ffc9f0d8afe0de98389ac0df868ebe7e2f4e767580afdb7a\"" Dec 13 14:28:46.235002 env[1231]: time="2024-12-13T14:28:46.234955895Z" level=info msg="StartContainer for \"a33f110bb20cabc5ffc9f0d8afe0de98389ac0df868ebe7e2f4e767580afdb7a\"" Dec 13 14:28:46.259287 systemd[1]: Started cri-containerd-a33f110bb20cabc5ffc9f0d8afe0de98389ac0df868ebe7e2f4e767580afdb7a.scope. Dec 13 14:28:46.279000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.279000 audit[2694]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001196b0 a2=3c a3=7f5469223ff8 items=0 ppid=2542 pid=2694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:46.279000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133336631313062623230636162633566666339663064386166653064 Dec 13 14:28:46.279000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.279000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.279000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.279000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.279000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.279000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.279000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.279000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.279000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.279000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.279000 audit: BPF prog-id=130 op=LOAD Dec 13 14:28:46.279000 audit[2694]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001199d8 a2=78 a3=c0001b3f68 items=0 ppid=2542 pid=2694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:46.279000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133336631313062623230636162633566666339663064386166653064 Dec 13 14:28:46.279000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.279000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.279000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.279000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.279000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.279000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.279000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.279000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.279000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.279000 audit: BPF prog-id=131 op=LOAD Dec 13 14:28:46.279000 audit[2694]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000119770 a2=78 a3=c0001b3fb8 items=0 ppid=2542 pid=2694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:46.279000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133336631313062623230636162633566666339663064386166653064 Dec 13 14:28:46.279000 audit: BPF prog-id=131 op=UNLOAD Dec 13 14:28:46.279000 audit: BPF prog-id=130 op=UNLOAD Dec 13 14:28:46.279000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.279000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.279000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.279000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.279000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.279000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.279000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.279000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.279000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.279000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:46.279000 audit: BPF prog-id=132 op=LOAD Dec 13 14:28:46.279000 audit[2694]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000119c30 a2=78 a3=c0001fe048 items=0 ppid=2542 pid=2694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:46.279000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133336631313062623230636162633566666339663064386166653064 Dec 13 14:28:46.301052 env[1231]: time="2024-12-13T14:28:46.300976384Z" level=info msg="StartContainer for \"a33f110bb20cabc5ffc9f0d8afe0de98389ac0df868ebe7e2f4e767580afdb7a\" returns successfully" Dec 13 14:28:46.311380 systemd[1]: cri-containerd-a33f110bb20cabc5ffc9f0d8afe0de98389ac0df868ebe7e2f4e767580afdb7a.scope: Deactivated successfully. Dec 13 14:28:46.314000 audit: BPF prog-id=132 op=UNLOAD Dec 13 14:28:46.671631 env[1231]: time="2024-12-13T14:28:46.671572146Z" level=info msg="shim disconnected" id=a33f110bb20cabc5ffc9f0d8afe0de98389ac0df868ebe7e2f4e767580afdb7a Dec 13 14:28:46.671631 env[1231]: time="2024-12-13T14:28:46.671629380Z" level=warning msg="cleaning up after shim disconnected" id=a33f110bb20cabc5ffc9f0d8afe0de98389ac0df868ebe7e2f4e767580afdb7a namespace=k8s.io Dec 13 14:28:46.671631 env[1231]: time="2024-12-13T14:28:46.671638328Z" level=info msg="cleaning up dead shim" Dec 13 14:28:46.679280 env[1231]: time="2024-12-13T14:28:46.679228219Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:28:46Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2733 runtime=io.containerd.runc.v2\n" Dec 13 14:28:46.971931 kubelet[2075]: E1213 14:28:46.971524 2075 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:46.973356 env[1231]: time="2024-12-13T14:28:46.973281903Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 14:28:47.224264 systemd[1]: run-containerd-runc-k8s.io-a33f110bb20cabc5ffc9f0d8afe0de98389ac0df868ebe7e2f4e767580afdb7a-runc.opjeXk.mount: Deactivated successfully. Dec 13 14:28:47.224375 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a33f110bb20cabc5ffc9f0d8afe0de98389ac0df868ebe7e2f4e767580afdb7a-rootfs.mount: Deactivated successfully. Dec 13 14:28:47.901236 kubelet[2075]: E1213 14:28:47.901155 2075 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tstdc" podUID="d48acee9-c06b-4aaa-a5e2-0d0779dceacf" Dec 13 14:28:48.099885 systemd[1]: Started sshd@7-10.0.0.112:22-10.0.0.1:38798.service. Dec 13 14:28:48.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.112:22-10.0.0.1:38798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:48.133000 audit[2753]: USER_ACCT pid=2753 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:48.135279 sshd[2753]: Accepted publickey for core from 10.0.0.1 port 38798 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:28:48.135000 audit[2753]: CRED_ACQ pid=2753 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:48.135000 audit[2753]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe00b3b8c0 a2=3 a3=0 items=0 ppid=1 pid=2753 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:48.135000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:28:48.136492 sshd[2753]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:28:48.186336 systemd-logind[1219]: New session 8 of user core. Dec 13 14:28:48.187264 systemd[1]: Started session-8.scope. Dec 13 14:28:48.190000 audit[2753]: USER_START pid=2753 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:48.192000 audit[2755]: CRED_ACQ pid=2755 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:48.312843 sshd[2753]: pam_unix(sshd:session): session closed for user core Dec 13 14:28:48.313000 audit[2753]: USER_END pid=2753 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:48.313000 audit[2753]: CRED_DISP pid=2753 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:48.315200 systemd[1]: sshd@7-10.0.0.112:22-10.0.0.1:38798.service: Deactivated successfully. Dec 13 14:28:48.315000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.112:22-10.0.0.1:38798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:48.316010 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 14:28:48.316609 systemd-logind[1219]: Session 8 logged out. Waiting for processes to exit. Dec 13 14:28:48.317330 systemd-logind[1219]: Removed session 8. Dec 13 14:28:49.901052 kubelet[2075]: E1213 14:28:49.900974 2075 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tstdc" podUID="d48acee9-c06b-4aaa-a5e2-0d0779dceacf" Dec 13 14:28:51.901810 kubelet[2075]: E1213 14:28:51.901726 2075 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tstdc" podUID="d48acee9-c06b-4aaa-a5e2-0d0779dceacf" Dec 13 14:28:53.318000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.112:22-10.0.0.1:38802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:53.321166 kubelet[2075]: I1213 14:28:53.316109 2075 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:28:53.321166 kubelet[2075]: E1213 14:28:53.316815 2075 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:53.318941 systemd[1]: Started sshd@8-10.0.0.112:22-10.0.0.1:38802.service. Dec 13 14:28:53.329190 kernel: kauditd_printk_skb: 112 callbacks suppressed Dec 13 14:28:53.329311 kernel: audit: type=1130 audit(1734100133.318:993): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.112:22-10.0.0.1:38802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:53.357000 audit[2769]: USER_ACCT pid=2769 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:53.361000 audit[2769]: CRED_ACQ pid=2769 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:53.363037 sshd[2769]: Accepted publickey for core from 10.0.0.1 port 38802 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:28:53.363343 kernel: audit: type=1101 audit(1734100133.357:994): pid=2769 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:53.363391 kernel: audit: type=1103 audit(1734100133.361:995): pid=2769 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:53.363234 sshd[2769]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:28:53.369278 kernel: audit: type=1006 audit(1734100133.361:996): pid=2769 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Dec 13 14:28:53.369334 kernel: audit: type=1300 audit(1734100133.361:996): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc60ef47d0 a2=3 a3=0 items=0 ppid=1 pid=2769 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:53.361000 audit[2769]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc60ef47d0 a2=3 a3=0 items=0 ppid=1 pid=2769 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:53.361000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:28:53.374592 kernel: audit: type=1327 audit(1734100133.361:996): proctitle=737368643A20636F7265205B707269765D Dec 13 14:28:53.377457 systemd[1]: Started session-9.scope. Dec 13 14:28:53.377896 systemd-logind[1219]: New session 9 of user core. Dec 13 14:28:53.382000 audit[2769]: USER_START pid=2769 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:53.391935 kernel: audit: type=1105 audit(1734100133.382:997): pid=2769 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:53.392000 kernel: audit: type=1103 audit(1734100133.384:998): pid=2771 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:53.384000 audit[2771]: CRED_ACQ pid=2771 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:53.623317 sshd[2769]: pam_unix(sshd:session): session closed for user core Dec 13 14:28:53.623000 audit[2769]: USER_END pid=2769 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:53.626270 systemd[1]: sshd@8-10.0.0.112:22-10.0.0.1:38802.service: Deactivated successfully. Dec 13 14:28:53.627068 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 14:28:53.623000 audit[2769]: CRED_DISP pid=2769 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:53.632409 kernel: audit: type=1106 audit(1734100133.623:999): pid=2769 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:53.632548 kernel: audit: type=1104 audit(1734100133.623:1000): pid=2769 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:53.625000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.112:22-10.0.0.1:38802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:53.632906 systemd-logind[1219]: Session 9 logged out. Waiting for processes to exit. Dec 13 14:28:53.633807 systemd-logind[1219]: Removed session 9. Dec 13 14:28:53.709000 audit[2784]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=2784 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:28:53.709000 audit[2784]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffe4e6f5950 a2=0 a3=7ffe4e6f593c items=0 ppid=2274 pid=2784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:53.709000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:28:53.720000 audit[2784]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2784 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:28:53.720000 audit[2784]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffe4e6f5950 a2=0 a3=7ffe4e6f593c items=0 ppid=2274 pid=2784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:53.720000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:28:53.901950 kubelet[2075]: E1213 14:28:53.901794 2075 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tstdc" podUID="d48acee9-c06b-4aaa-a5e2-0d0779dceacf" Dec 13 14:28:53.984061 kubelet[2075]: E1213 14:28:53.984024 2075 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:55.901399 kubelet[2075]: E1213 14:28:55.901341 2075 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tstdc" podUID="d48acee9-c06b-4aaa-a5e2-0d0779dceacf" Dec 13 14:28:56.285720 env[1231]: time="2024-12-13T14:28:56.285561931Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:56.287629 env[1231]: time="2024-12-13T14:28:56.287594370Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:56.289216 env[1231]: time="2024-12-13T14:28:56.289180626Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:56.290907 env[1231]: time="2024-12-13T14:28:56.290864024Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:28:56.291419 env[1231]: time="2024-12-13T14:28:56.291378698Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 14:28:56.293156 env[1231]: time="2024-12-13T14:28:56.293122924Z" level=info msg="CreateContainer within sandbox \"b5b42eda82b8c02525b057c175b4554dd42f33e624d5a9a59fe508104733fd2a\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:28:56.313459 env[1231]: time="2024-12-13T14:28:56.313399735Z" level=info msg="CreateContainer within sandbox \"b5b42eda82b8c02525b057c175b4554dd42f33e624d5a9a59fe508104733fd2a\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"ac154d8a71eb7e7dfb0f384303d08c0d246356e778d34c9e88bfcadb9cdd4ceb\"" Dec 13 14:28:56.314059 env[1231]: time="2024-12-13T14:28:56.314009506Z" level=info msg="StartContainer for \"ac154d8a71eb7e7dfb0f384303d08c0d246356e778d34c9e88bfcadb9cdd4ceb\"" Dec 13 14:28:56.336384 systemd[1]: Started cri-containerd-ac154d8a71eb7e7dfb0f384303d08c0d246356e778d34c9e88bfcadb9cdd4ceb.scope. Dec 13 14:28:56.353000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:56.353000 audit[2792]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fd9ad4d4808 items=0 ppid=2542 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:56.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163313534643861373165623765376466623066333834333033643038 Dec 13 14:28:56.353000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:56.353000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:56.353000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:56.353000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:56.353000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:56.353000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:56.353000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:56.353000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:56.353000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:56.353000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:56.353000 audit: BPF prog-id=133 op=LOAD Dec 13 14:28:56.353000 audit[2792]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0003b00c8 items=0 ppid=2542 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:56.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163313534643861373165623765376466623066333834333033643038 Dec 13 14:28:56.353000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:56.353000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:56.353000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:56.353000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:56.353000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:56.353000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:56.353000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:56.353000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:56.353000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:56.353000 audit: BPF prog-id=134 op=LOAD Dec 13 14:28:56.353000 audit[2792]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0003b0118 items=0 ppid=2542 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:56.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163313534643861373165623765376466623066333834333033643038 Dec 13 14:28:56.353000 audit: BPF prog-id=134 op=UNLOAD Dec 13 14:28:56.353000 audit: BPF prog-id=133 op=UNLOAD Dec 13 14:28:56.353000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:56.353000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:56.353000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:56.353000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:56.353000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:56.353000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:56.353000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:56.353000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:56.353000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:56.353000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:28:56.353000 audit: BPF prog-id=135 op=LOAD Dec 13 14:28:56.353000 audit[2792]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0003b01a8 items=0 ppid=2542 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:56.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163313534643861373165623765376466623066333834333033643038 Dec 13 14:28:56.508987 env[1231]: time="2024-12-13T14:28:56.508932256Z" level=info msg="StartContainer for \"ac154d8a71eb7e7dfb0f384303d08c0d246356e778d34c9e88bfcadb9cdd4ceb\" returns successfully" Dec 13 14:28:56.991891 kubelet[2075]: E1213 14:28:56.991614 2075 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:57.900919 kubelet[2075]: E1213 14:28:57.900879 2075 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tstdc" podUID="d48acee9-c06b-4aaa-a5e2-0d0779dceacf" Dec 13 14:28:57.993631 kubelet[2075]: E1213 14:28:57.993595 2075 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:58.626253 systemd[1]: Started sshd@9-10.0.0.112:22-10.0.0.1:47456.service. Dec 13 14:28:58.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.112:22-10.0.0.1:47456 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:58.627572 kernel: kauditd_printk_skb: 50 callbacks suppressed Dec 13 14:28:58.627631 kernel: audit: type=1130 audit(1734100138.625:1010): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.112:22-10.0.0.1:47456 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:58.703000 audit[2823]: USER_ACCT pid=2823 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:58.704798 sshd[2823]: Accepted publickey for core from 10.0.0.1 port 47456 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:28:58.716527 sshd[2823]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:28:58.708000 audit[2823]: CRED_ACQ pid=2823 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:58.721007 systemd-logind[1219]: New session 10 of user core. Dec 13 14:28:58.721789 systemd[1]: Started session-10.scope. Dec 13 14:28:58.723504 kernel: audit: type=1101 audit(1734100138.703:1011): pid=2823 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:58.723637 kernel: audit: type=1103 audit(1734100138.708:1012): pid=2823 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:58.723666 kernel: audit: type=1006 audit(1734100138.708:1013): pid=2823 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Dec 13 14:28:58.726561 kernel: audit: type=1300 audit(1734100138.708:1013): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5ffefc80 a2=3 a3=0 items=0 ppid=1 pid=2823 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:58.708000 audit[2823]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5ffefc80 a2=3 a3=0 items=0 ppid=1 pid=2823 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:28:58.708000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:28:58.734576 kernel: audit: type=1327 audit(1734100138.708:1013): proctitle=737368643A20636F7265205B707269765D Dec 13 14:28:58.734649 kernel: audit: type=1105 audit(1734100138.726:1014): pid=2823 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:58.726000 audit[2823]: USER_START pid=2823 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:58.739150 kernel: audit: type=1103 audit(1734100138.727:1015): pid=2825 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:58.727000 audit[2825]: CRED_ACQ pid=2825 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:58.831779 env[1231]: time="2024-12-13T14:28:58.831654088Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:28:58.835316 systemd[1]: cri-containerd-ac154d8a71eb7e7dfb0f384303d08c0d246356e778d34c9e88bfcadb9cdd4ceb.scope: Deactivated successfully. Dec 13 14:28:58.839000 audit: BPF prog-id=135 op=UNLOAD Dec 13 14:28:58.842101 kernel: audit: type=1334 audit(1734100138.839:1016): prog-id=135 op=UNLOAD Dec 13 14:28:58.849936 sshd[2823]: pam_unix(sshd:session): session closed for user core Dec 13 14:28:58.850000 audit[2823]: USER_END pid=2823 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:58.853691 systemd[1]: sshd@9-10.0.0.112:22-10.0.0.1:47456.service: Deactivated successfully. Dec 13 14:28:58.854577 systemd[1]: session-10.scope: Deactivated successfully. Dec 13 14:28:58.850000 audit[2823]: CRED_DISP pid=2823 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:58.850000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.112:22-10.0.0.1:47456 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:28:58.857124 kernel: audit: type=1106 audit(1734100138.850:1017): pid=2823 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:28:58.857791 systemd-logind[1219]: Session 10 logged out. Waiting for processes to exit. Dec 13 14:28:58.859121 systemd-logind[1219]: Removed session 10. Dec 13 14:28:58.860531 kubelet[2075]: I1213 14:28:58.860488 2075 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 14:28:58.865493 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ac154d8a71eb7e7dfb0f384303d08c0d246356e778d34c9e88bfcadb9cdd4ceb-rootfs.mount: Deactivated successfully. Dec 13 14:28:58.880020 env[1231]: time="2024-12-13T14:28:58.879864466Z" level=info msg="shim disconnected" id=ac154d8a71eb7e7dfb0f384303d08c0d246356e778d34c9e88bfcadb9cdd4ceb Dec 13 14:28:58.880020 env[1231]: time="2024-12-13T14:28:58.879910256Z" level=warning msg="cleaning up after shim disconnected" id=ac154d8a71eb7e7dfb0f384303d08c0d246356e778d34c9e88bfcadb9cdd4ceb namespace=k8s.io Dec 13 14:28:58.880020 env[1231]: time="2024-12-13T14:28:58.879919283Z" level=info msg="cleaning up dead shim" Dec 13 14:28:58.886631 kubelet[2075]: I1213 14:28:58.886559 2075 topology_manager.go:215] "Topology Admit Handler" podUID="d1f940d3-bfb4-4c44-ba58-bdb360e4465a" podNamespace="kube-system" podName="coredns-76f75df574-flvr8" Dec 13 14:28:58.890145 env[1231]: time="2024-12-13T14:28:58.889981326Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:28:58Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2849 runtime=io.containerd.runc.v2\n" Dec 13 14:28:58.896788 systemd[1]: Created slice kubepods-burstable-podd1f940d3_bfb4_4c44_ba58_bdb360e4465a.slice. Dec 13 14:28:58.903770 kubelet[2075]: I1213 14:28:58.903706 2075 topology_manager.go:215] "Topology Admit Handler" podUID="c769c3a1-a661-47f5-890d-b6c9415fb6c6" podNamespace="calico-system" podName="calico-kube-controllers-78f4954bf9-7pxmq" Dec 13 14:28:58.904013 kubelet[2075]: I1213 14:28:58.903990 2075 topology_manager.go:215] "Topology Admit Handler" podUID="ff87d310-5f73-4992-8cd9-347d96eba088" podNamespace="calico-apiserver" podName="calico-apiserver-6fdbbd74b4-s4mbj" Dec 13 14:28:58.915746 kubelet[2075]: I1213 14:28:58.915703 2075 topology_manager.go:215] "Topology Admit Handler" podUID="be7aad04-b593-4297-97e8-844aa1f8a505" podNamespace="kube-system" podName="coredns-76f75df574-mxrls" Dec 13 14:28:58.916330 kubelet[2075]: I1213 14:28:58.916316 2075 topology_manager.go:215] "Topology Admit Handler" podUID="77b0e9b3-1aa6-45f0-8681-3e913425307b" podNamespace="calico-apiserver" podName="calico-apiserver-6fdbbd74b4-qmlf8" Dec 13 14:28:58.918020 systemd[1]: Created slice kubepods-besteffort-podc769c3a1_a661_47f5_890d_b6c9415fb6c6.slice. Dec 13 14:28:58.922938 systemd[1]: Created slice kubepods-besteffort-podff87d310_5f73_4992_8cd9_347d96eba088.slice. Dec 13 14:28:58.927487 systemd[1]: Created slice kubepods-burstable-podbe7aad04_b593_4297_97e8_844aa1f8a505.slice. Dec 13 14:28:58.933991 systemd[1]: Created slice kubepods-besteffort-pod77b0e9b3_1aa6_45f0_8681_3e913425307b.slice. Dec 13 14:28:58.982340 kubelet[2075]: I1213 14:28:58.982278 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2xj6s\" (UniqueName: \"kubernetes.io/projected/be7aad04-b593-4297-97e8-844aa1f8a505-kube-api-access-2xj6s\") pod \"coredns-76f75df574-mxrls\" (UID: \"be7aad04-b593-4297-97e8-844aa1f8a505\") " pod="kube-system/coredns-76f75df574-mxrls" Dec 13 14:28:58.982340 kubelet[2075]: I1213 14:28:58.982328 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-v6rsl\" (UniqueName: \"kubernetes.io/projected/d1f940d3-bfb4-4c44-ba58-bdb360e4465a-kube-api-access-v6rsl\") pod \"coredns-76f75df574-flvr8\" (UID: \"d1f940d3-bfb4-4c44-ba58-bdb360e4465a\") " pod="kube-system/coredns-76f75df574-flvr8" Dec 13 14:28:58.982593 kubelet[2075]: I1213 14:28:58.982446 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/77b0e9b3-1aa6-45f0-8681-3e913425307b-calico-apiserver-certs\") pod \"calico-apiserver-6fdbbd74b4-qmlf8\" (UID: \"77b0e9b3-1aa6-45f0-8681-3e913425307b\") " pod="calico-apiserver/calico-apiserver-6fdbbd74b4-qmlf8" Dec 13 14:28:58.982593 kubelet[2075]: I1213 14:28:58.982505 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6qqzj\" (UniqueName: \"kubernetes.io/projected/77b0e9b3-1aa6-45f0-8681-3e913425307b-kube-api-access-6qqzj\") pod \"calico-apiserver-6fdbbd74b4-qmlf8\" (UID: \"77b0e9b3-1aa6-45f0-8681-3e913425307b\") " pod="calico-apiserver/calico-apiserver-6fdbbd74b4-qmlf8" Dec 13 14:28:58.982753 kubelet[2075]: I1213 14:28:58.982698 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kqgjv\" (UniqueName: \"kubernetes.io/projected/ff87d310-5f73-4992-8cd9-347d96eba088-kube-api-access-kqgjv\") pod \"calico-apiserver-6fdbbd74b4-s4mbj\" (UID: \"ff87d310-5f73-4992-8cd9-347d96eba088\") " pod="calico-apiserver/calico-apiserver-6fdbbd74b4-s4mbj" Dec 13 14:28:58.982806 kubelet[2075]: I1213 14:28:58.982768 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/be7aad04-b593-4297-97e8-844aa1f8a505-config-volume\") pod \"coredns-76f75df574-mxrls\" (UID: \"be7aad04-b593-4297-97e8-844aa1f8a505\") " pod="kube-system/coredns-76f75df574-mxrls" Dec 13 14:28:58.982906 kubelet[2075]: I1213 14:28:58.982809 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c769c3a1-a661-47f5-890d-b6c9415fb6c6-tigera-ca-bundle\") pod \"calico-kube-controllers-78f4954bf9-7pxmq\" (UID: \"c769c3a1-a661-47f5-890d-b6c9415fb6c6\") " pod="calico-system/calico-kube-controllers-78f4954bf9-7pxmq" Dec 13 14:28:58.982906 kubelet[2075]: I1213 14:28:58.982840 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jjzcd\" (UniqueName: \"kubernetes.io/projected/c769c3a1-a661-47f5-890d-b6c9415fb6c6-kube-api-access-jjzcd\") pod \"calico-kube-controllers-78f4954bf9-7pxmq\" (UID: \"c769c3a1-a661-47f5-890d-b6c9415fb6c6\") " pod="calico-system/calico-kube-controllers-78f4954bf9-7pxmq" Dec 13 14:28:58.982906 kubelet[2075]: I1213 14:28:58.982860 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/ff87d310-5f73-4992-8cd9-347d96eba088-calico-apiserver-certs\") pod \"calico-apiserver-6fdbbd74b4-s4mbj\" (UID: \"ff87d310-5f73-4992-8cd9-347d96eba088\") " pod="calico-apiserver/calico-apiserver-6fdbbd74b4-s4mbj" Dec 13 14:28:58.982906 kubelet[2075]: I1213 14:28:58.982887 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/d1f940d3-bfb4-4c44-ba58-bdb360e4465a-config-volume\") pod \"coredns-76f75df574-flvr8\" (UID: \"d1f940d3-bfb4-4c44-ba58-bdb360e4465a\") " pod="kube-system/coredns-76f75df574-flvr8" Dec 13 14:28:58.996515 kubelet[2075]: E1213 14:28:58.996481 2075 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:58.997411 env[1231]: time="2024-12-13T14:28:58.997365483Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 14:28:59.213378 kubelet[2075]: E1213 14:28:59.213223 2075 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:59.215013 env[1231]: time="2024-12-13T14:28:59.214955538Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-flvr8,Uid:d1f940d3-bfb4-4c44-ba58-bdb360e4465a,Namespace:kube-system,Attempt:0,}" Dec 13 14:28:59.221890 env[1231]: time="2024-12-13T14:28:59.221833474Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-78f4954bf9-7pxmq,Uid:c769c3a1-a661-47f5-890d-b6c9415fb6c6,Namespace:calico-system,Attempt:0,}" Dec 13 14:28:59.225995 env[1231]: time="2024-12-13T14:28:59.225939921Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6fdbbd74b4-s4mbj,Uid:ff87d310-5f73-4992-8cd9-347d96eba088,Namespace:calico-apiserver,Attempt:0,}" Dec 13 14:28:59.232323 kubelet[2075]: E1213 14:28:59.232263 2075 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:28:59.232706 env[1231]: time="2024-12-13T14:28:59.232660711Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-mxrls,Uid:be7aad04-b593-4297-97e8-844aa1f8a505,Namespace:kube-system,Attempt:0,}" Dec 13 14:28:59.236730 env[1231]: time="2024-12-13T14:28:59.236665451Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6fdbbd74b4-qmlf8,Uid:77b0e9b3-1aa6-45f0-8681-3e913425307b,Namespace:calico-apiserver,Attempt:0,}" Dec 13 14:28:59.460563 env[1231]: time="2024-12-13T14:28:59.460440285Z" level=error msg="Failed to destroy network for sandbox \"1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:28:59.460944 env[1231]: time="2024-12-13T14:28:59.460905892Z" level=error msg="encountered an error cleaning up failed sandbox \"1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:28:59.461004 env[1231]: time="2024-12-13T14:28:59.460969827Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-mxrls,Uid:be7aad04-b593-4297-97e8-844aa1f8a505,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:28:59.461438 kubelet[2075]: E1213 14:28:59.461388 2075 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:28:59.461521 kubelet[2075]: E1213 14:28:59.461484 2075 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-mxrls" Dec 13 14:28:59.461521 kubelet[2075]: E1213 14:28:59.461518 2075 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-mxrls" Dec 13 14:28:59.461610 kubelet[2075]: E1213 14:28:59.461587 2075 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-mxrls_kube-system(be7aad04-b593-4297-97e8-844aa1f8a505)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-mxrls_kube-system(be7aad04-b593-4297-97e8-844aa1f8a505)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-mxrls" podUID="be7aad04-b593-4297-97e8-844aa1f8a505" Dec 13 14:28:59.470223 env[1231]: time="2024-12-13T14:28:59.470041795Z" level=error msg="Failed to destroy network for sandbox \"e748bd5aa30256f12d4430cae505697bd2b9a24d37b89947f82c485c4caee13a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:28:59.471043 env[1231]: time="2024-12-13T14:28:59.471014691Z" level=error msg="encountered an error cleaning up failed sandbox \"e748bd5aa30256f12d4430cae505697bd2b9a24d37b89947f82c485c4caee13a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:28:59.471206 env[1231]: time="2024-12-13T14:28:59.471176326Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-78f4954bf9-7pxmq,Uid:c769c3a1-a661-47f5-890d-b6c9415fb6c6,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e748bd5aa30256f12d4430cae505697bd2b9a24d37b89947f82c485c4caee13a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:28:59.471689 kubelet[2075]: E1213 14:28:59.471630 2075 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e748bd5aa30256f12d4430cae505697bd2b9a24d37b89947f82c485c4caee13a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:28:59.471774 kubelet[2075]: E1213 14:28:59.471722 2075 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e748bd5aa30256f12d4430cae505697bd2b9a24d37b89947f82c485c4caee13a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-78f4954bf9-7pxmq" Dec 13 14:28:59.471774 kubelet[2075]: E1213 14:28:59.471756 2075 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e748bd5aa30256f12d4430cae505697bd2b9a24d37b89947f82c485c4caee13a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-78f4954bf9-7pxmq" Dec 13 14:28:59.471838 kubelet[2075]: E1213 14:28:59.471829 2075 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-78f4954bf9-7pxmq_calico-system(c769c3a1-a661-47f5-890d-b6c9415fb6c6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-78f4954bf9-7pxmq_calico-system(c769c3a1-a661-47f5-890d-b6c9415fb6c6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e748bd5aa30256f12d4430cae505697bd2b9a24d37b89947f82c485c4caee13a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-78f4954bf9-7pxmq" podUID="c769c3a1-a661-47f5-890d-b6c9415fb6c6" Dec 13 14:28:59.474785 env[1231]: time="2024-12-13T14:28:59.474708855Z" level=error msg="Failed to destroy network for sandbox \"3365bcbfb0c17dc5eb8337e4c1f6c2b8025fbd68da45bd7a93c55d755ee1543c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:28:59.475379 env[1231]: time="2024-12-13T14:28:59.475351116Z" level=error msg="encountered an error cleaning up failed sandbox \"3365bcbfb0c17dc5eb8337e4c1f6c2b8025fbd68da45bd7a93c55d755ee1543c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:28:59.475550 env[1231]: time="2024-12-13T14:28:59.475483423Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6fdbbd74b4-qmlf8,Uid:77b0e9b3-1aa6-45f0-8681-3e913425307b,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3365bcbfb0c17dc5eb8337e4c1f6c2b8025fbd68da45bd7a93c55d755ee1543c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:28:59.475841 kubelet[2075]: E1213 14:28:59.475808 2075 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3365bcbfb0c17dc5eb8337e4c1f6c2b8025fbd68da45bd7a93c55d755ee1543c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:28:59.475934 kubelet[2075]: E1213 14:28:59.475864 2075 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3365bcbfb0c17dc5eb8337e4c1f6c2b8025fbd68da45bd7a93c55d755ee1543c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6fdbbd74b4-qmlf8" Dec 13 14:28:59.475934 kubelet[2075]: E1213 14:28:59.475885 2075 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3365bcbfb0c17dc5eb8337e4c1f6c2b8025fbd68da45bd7a93c55d755ee1543c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6fdbbd74b4-qmlf8" Dec 13 14:28:59.475992 kubelet[2075]: E1213 14:28:59.475938 2075 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-6fdbbd74b4-qmlf8_calico-apiserver(77b0e9b3-1aa6-45f0-8681-3e913425307b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-6fdbbd74b4-qmlf8_calico-apiserver(77b0e9b3-1aa6-45f0-8681-3e913425307b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3365bcbfb0c17dc5eb8337e4c1f6c2b8025fbd68da45bd7a93c55d755ee1543c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6fdbbd74b4-qmlf8" podUID="77b0e9b3-1aa6-45f0-8681-3e913425307b" Dec 13 14:28:59.476139 env[1231]: time="2024-12-13T14:28:59.476100586Z" level=error msg="Failed to destroy network for sandbox \"73c809ecb32e20add5ba2387a36fe05c5f2439b3c82355a300a062a4708b6126\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:28:59.476419 env[1231]: time="2024-12-13T14:28:59.476389699Z" level=error msg="encountered an error cleaning up failed sandbox \"73c809ecb32e20add5ba2387a36fe05c5f2439b3c82355a300a062a4708b6126\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:28:59.476476 env[1231]: time="2024-12-13T14:28:59.476433314Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-flvr8,Uid:d1f940d3-bfb4-4c44-ba58-bdb360e4465a,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"73c809ecb32e20add5ba2387a36fe05c5f2439b3c82355a300a062a4708b6126\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:28:59.476589 kubelet[2075]: E1213 14:28:59.476571 2075 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"73c809ecb32e20add5ba2387a36fe05c5f2439b3c82355a300a062a4708b6126\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:28:59.476661 kubelet[2075]: E1213 14:28:59.476612 2075 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"73c809ecb32e20add5ba2387a36fe05c5f2439b3c82355a300a062a4708b6126\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-flvr8" Dec 13 14:28:59.476661 kubelet[2075]: E1213 14:28:59.476628 2075 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"73c809ecb32e20add5ba2387a36fe05c5f2439b3c82355a300a062a4708b6126\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-flvr8" Dec 13 14:28:59.476724 kubelet[2075]: E1213 14:28:59.476672 2075 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-flvr8_kube-system(d1f940d3-bfb4-4c44-ba58-bdb360e4465a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-flvr8_kube-system(d1f940d3-bfb4-4c44-ba58-bdb360e4465a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"73c809ecb32e20add5ba2387a36fe05c5f2439b3c82355a300a062a4708b6126\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-flvr8" podUID="d1f940d3-bfb4-4c44-ba58-bdb360e4465a" Dec 13 14:28:59.497757 env[1231]: time="2024-12-13T14:28:59.497662460Z" level=error msg="Failed to destroy network for sandbox \"b0d2329f241ed52341e0e83a277c3646764f348f830084ca33c5b023fec4fbed\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:28:59.498157 env[1231]: time="2024-12-13T14:28:59.498122876Z" level=error msg="encountered an error cleaning up failed sandbox \"b0d2329f241ed52341e0e83a277c3646764f348f830084ca33c5b023fec4fbed\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:28:59.498222 env[1231]: time="2024-12-13T14:28:59.498183013Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6fdbbd74b4-s4mbj,Uid:ff87d310-5f73-4992-8cd9-347d96eba088,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b0d2329f241ed52341e0e83a277c3646764f348f830084ca33c5b023fec4fbed\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:28:59.498581 kubelet[2075]: E1213 14:28:59.498553 2075 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b0d2329f241ed52341e0e83a277c3646764f348f830084ca33c5b023fec4fbed\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:28:59.498677 kubelet[2075]: E1213 14:28:59.498607 2075 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b0d2329f241ed52341e0e83a277c3646764f348f830084ca33c5b023fec4fbed\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6fdbbd74b4-s4mbj" Dec 13 14:28:59.498677 kubelet[2075]: E1213 14:28:59.498627 2075 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b0d2329f241ed52341e0e83a277c3646764f348f830084ca33c5b023fec4fbed\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6fdbbd74b4-s4mbj" Dec 13 14:28:59.498774 kubelet[2075]: E1213 14:28:59.498683 2075 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-6fdbbd74b4-s4mbj_calico-apiserver(ff87d310-5f73-4992-8cd9-347d96eba088)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-6fdbbd74b4-s4mbj_calico-apiserver(ff87d310-5f73-4992-8cd9-347d96eba088)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b0d2329f241ed52341e0e83a277c3646764f348f830084ca33c5b023fec4fbed\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6fdbbd74b4-s4mbj" podUID="ff87d310-5f73-4992-8cd9-347d96eba088" Dec 13 14:28:59.866611 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4-shm.mount: Deactivated successfully. Dec 13 14:28:59.905499 systemd[1]: Created slice kubepods-besteffort-podd48acee9_c06b_4aaa_a5e2_0d0779dceacf.slice. Dec 13 14:28:59.907452 env[1231]: time="2024-12-13T14:28:59.907412872Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-tstdc,Uid:d48acee9-c06b-4aaa-a5e2-0d0779dceacf,Namespace:calico-system,Attempt:0,}" Dec 13 14:28:59.999128 kubelet[2075]: I1213 14:28:59.999099 2075 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3365bcbfb0c17dc5eb8337e4c1f6c2b8025fbd68da45bd7a93c55d755ee1543c" Dec 13 14:28:59.999695 env[1231]: time="2024-12-13T14:28:59.999664432Z" level=info msg="StopPodSandbox for \"3365bcbfb0c17dc5eb8337e4c1f6c2b8025fbd68da45bd7a93c55d755ee1543c\"" Dec 13 14:28:59.999793 kubelet[2075]: I1213 14:28:59.999751 2075 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b0d2329f241ed52341e0e83a277c3646764f348f830084ca33c5b023fec4fbed" Dec 13 14:29:00.000420 env[1231]: time="2024-12-13T14:29:00.000396357Z" level=info msg="StopPodSandbox for \"b0d2329f241ed52341e0e83a277c3646764f348f830084ca33c5b023fec4fbed\"" Dec 13 14:29:00.001354 kubelet[2075]: I1213 14:29:00.001325 2075 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4" Dec 13 14:29:00.002046 env[1231]: time="2024-12-13T14:29:00.002008596Z" level=info msg="StopPodSandbox for \"1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4\"" Dec 13 14:29:00.002839 kubelet[2075]: I1213 14:29:00.002809 2075 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="73c809ecb32e20add5ba2387a36fe05c5f2439b3c82355a300a062a4708b6126" Dec 13 14:29:00.003759 env[1231]: time="2024-12-13T14:29:00.003707952Z" level=info msg="StopPodSandbox for \"73c809ecb32e20add5ba2387a36fe05c5f2439b3c82355a300a062a4708b6126\"" Dec 13 14:29:00.005240 kubelet[2075]: I1213 14:29:00.005217 2075 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e748bd5aa30256f12d4430cae505697bd2b9a24d37b89947f82c485c4caee13a" Dec 13 14:29:00.005746 env[1231]: time="2024-12-13T14:29:00.005713757Z" level=info msg="StopPodSandbox for \"e748bd5aa30256f12d4430cae505697bd2b9a24d37b89947f82c485c4caee13a\"" Dec 13 14:29:00.038433 env[1231]: time="2024-12-13T14:29:00.038364450Z" level=error msg="StopPodSandbox for \"3365bcbfb0c17dc5eb8337e4c1f6c2b8025fbd68da45bd7a93c55d755ee1543c\" failed" error="failed to destroy network for sandbox \"3365bcbfb0c17dc5eb8337e4c1f6c2b8025fbd68da45bd7a93c55d755ee1543c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:29:00.038673 kubelet[2075]: E1213 14:29:00.038625 2075 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3365bcbfb0c17dc5eb8337e4c1f6c2b8025fbd68da45bd7a93c55d755ee1543c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3365bcbfb0c17dc5eb8337e4c1f6c2b8025fbd68da45bd7a93c55d755ee1543c" Dec 13 14:29:00.038744 kubelet[2075]: E1213 14:29:00.038714 2075 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3365bcbfb0c17dc5eb8337e4c1f6c2b8025fbd68da45bd7a93c55d755ee1543c"} Dec 13 14:29:00.038800 kubelet[2075]: E1213 14:29:00.038759 2075 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"77b0e9b3-1aa6-45f0-8681-3e913425307b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3365bcbfb0c17dc5eb8337e4c1f6c2b8025fbd68da45bd7a93c55d755ee1543c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:29:00.038800 kubelet[2075]: E1213 14:29:00.038799 2075 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"77b0e9b3-1aa6-45f0-8681-3e913425307b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3365bcbfb0c17dc5eb8337e4c1f6c2b8025fbd68da45bd7a93c55d755ee1543c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6fdbbd74b4-qmlf8" podUID="77b0e9b3-1aa6-45f0-8681-3e913425307b" Dec 13 14:29:00.054297 env[1231]: time="2024-12-13T14:29:00.054222583Z" level=error msg="StopPodSandbox for \"b0d2329f241ed52341e0e83a277c3646764f348f830084ca33c5b023fec4fbed\" failed" error="failed to destroy network for sandbox \"b0d2329f241ed52341e0e83a277c3646764f348f830084ca33c5b023fec4fbed\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:29:00.054578 kubelet[2075]: E1213 14:29:00.054523 2075 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b0d2329f241ed52341e0e83a277c3646764f348f830084ca33c5b023fec4fbed\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b0d2329f241ed52341e0e83a277c3646764f348f830084ca33c5b023fec4fbed" Dec 13 14:29:00.054578 kubelet[2075]: E1213 14:29:00.054576 2075 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b0d2329f241ed52341e0e83a277c3646764f348f830084ca33c5b023fec4fbed"} Dec 13 14:29:00.054679 kubelet[2075]: E1213 14:29:00.054611 2075 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ff87d310-5f73-4992-8cd9-347d96eba088\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b0d2329f241ed52341e0e83a277c3646764f348f830084ca33c5b023fec4fbed\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:29:00.054679 kubelet[2075]: E1213 14:29:00.054639 2075 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ff87d310-5f73-4992-8cd9-347d96eba088\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b0d2329f241ed52341e0e83a277c3646764f348f830084ca33c5b023fec4fbed\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6fdbbd74b4-s4mbj" podUID="ff87d310-5f73-4992-8cd9-347d96eba088" Dec 13 14:29:00.068880 env[1231]: time="2024-12-13T14:29:00.068773511Z" level=error msg="StopPodSandbox for \"73c809ecb32e20add5ba2387a36fe05c5f2439b3c82355a300a062a4708b6126\" failed" error="failed to destroy network for sandbox \"73c809ecb32e20add5ba2387a36fe05c5f2439b3c82355a300a062a4708b6126\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:29:00.069106 kubelet[2075]: E1213 14:29:00.069088 2075 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"73c809ecb32e20add5ba2387a36fe05c5f2439b3c82355a300a062a4708b6126\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="73c809ecb32e20add5ba2387a36fe05c5f2439b3c82355a300a062a4708b6126" Dec 13 14:29:00.069172 kubelet[2075]: E1213 14:29:00.069130 2075 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"73c809ecb32e20add5ba2387a36fe05c5f2439b3c82355a300a062a4708b6126"} Dec 13 14:29:00.069172 kubelet[2075]: E1213 14:29:00.069168 2075 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d1f940d3-bfb4-4c44-ba58-bdb360e4465a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"73c809ecb32e20add5ba2387a36fe05c5f2439b3c82355a300a062a4708b6126\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:29:00.069300 kubelet[2075]: E1213 14:29:00.069198 2075 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d1f940d3-bfb4-4c44-ba58-bdb360e4465a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"73c809ecb32e20add5ba2387a36fe05c5f2439b3c82355a300a062a4708b6126\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-flvr8" podUID="d1f940d3-bfb4-4c44-ba58-bdb360e4465a" Dec 13 14:29:00.069489 env[1231]: time="2024-12-13T14:29:00.069419528Z" level=error msg="StopPodSandbox for \"1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4\" failed" error="failed to destroy network for sandbox \"1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:29:00.069699 kubelet[2075]: E1213 14:29:00.069680 2075 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4" Dec 13 14:29:00.069752 kubelet[2075]: E1213 14:29:00.069703 2075 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4"} Dec 13 14:29:00.069752 kubelet[2075]: E1213 14:29:00.069728 2075 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"be7aad04-b593-4297-97e8-844aa1f8a505\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:29:00.069752 kubelet[2075]: E1213 14:29:00.069748 2075 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"be7aad04-b593-4297-97e8-844aa1f8a505\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-mxrls" podUID="be7aad04-b593-4297-97e8-844aa1f8a505" Dec 13 14:29:00.072727 env[1231]: time="2024-12-13T14:29:00.072652901Z" level=error msg="StopPodSandbox for \"e748bd5aa30256f12d4430cae505697bd2b9a24d37b89947f82c485c4caee13a\" failed" error="failed to destroy network for sandbox \"e748bd5aa30256f12d4430cae505697bd2b9a24d37b89947f82c485c4caee13a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:29:00.073022 kubelet[2075]: E1213 14:29:00.072973 2075 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e748bd5aa30256f12d4430cae505697bd2b9a24d37b89947f82c485c4caee13a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e748bd5aa30256f12d4430cae505697bd2b9a24d37b89947f82c485c4caee13a" Dec 13 14:29:00.073132 kubelet[2075]: E1213 14:29:00.073040 2075 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e748bd5aa30256f12d4430cae505697bd2b9a24d37b89947f82c485c4caee13a"} Dec 13 14:29:00.073132 kubelet[2075]: E1213 14:29:00.073090 2075 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c769c3a1-a661-47f5-890d-b6c9415fb6c6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e748bd5aa30256f12d4430cae505697bd2b9a24d37b89947f82c485c4caee13a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:29:00.073132 kubelet[2075]: E1213 14:29:00.073123 2075 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c769c3a1-a661-47f5-890d-b6c9415fb6c6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e748bd5aa30256f12d4430cae505697bd2b9a24d37b89947f82c485c4caee13a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-78f4954bf9-7pxmq" podUID="c769c3a1-a661-47f5-890d-b6c9415fb6c6" Dec 13 14:29:00.107202 env[1231]: time="2024-12-13T14:29:00.107106153Z" level=error msg="Failed to destroy network for sandbox \"adb123cef83f66509da4f9499cf601ff4f666de1c943daa1f664d8d88fe06643\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:29:00.107635 env[1231]: time="2024-12-13T14:29:00.107590185Z" level=error msg="encountered an error cleaning up failed sandbox \"adb123cef83f66509da4f9499cf601ff4f666de1c943daa1f664d8d88fe06643\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:29:00.107687 env[1231]: time="2024-12-13T14:29:00.107659800Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-tstdc,Uid:d48acee9-c06b-4aaa-a5e2-0d0779dceacf,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"adb123cef83f66509da4f9499cf601ff4f666de1c943daa1f664d8d88fe06643\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:29:00.107974 kubelet[2075]: E1213 14:29:00.107939 2075 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"adb123cef83f66509da4f9499cf601ff4f666de1c943daa1f664d8d88fe06643\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:29:00.108088 kubelet[2075]: E1213 14:29:00.108001 2075 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"adb123cef83f66509da4f9499cf601ff4f666de1c943daa1f664d8d88fe06643\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-tstdc" Dec 13 14:29:00.108088 kubelet[2075]: E1213 14:29:00.108021 2075 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"adb123cef83f66509da4f9499cf601ff4f666de1c943daa1f664d8d88fe06643\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-tstdc" Dec 13 14:29:00.108160 kubelet[2075]: E1213 14:29:00.108110 2075 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-tstdc_calico-system(d48acee9-c06b-4aaa-a5e2-0d0779dceacf)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-tstdc_calico-system(d48acee9-c06b-4aaa-a5e2-0d0779dceacf)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"adb123cef83f66509da4f9499cf601ff4f666de1c943daa1f664d8d88fe06643\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-tstdc" podUID="d48acee9-c06b-4aaa-a5e2-0d0779dceacf" Dec 13 14:29:00.109522 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-adb123cef83f66509da4f9499cf601ff4f666de1c943daa1f664d8d88fe06643-shm.mount: Deactivated successfully. Dec 13 14:29:01.008510 kubelet[2075]: I1213 14:29:01.008475 2075 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="adb123cef83f66509da4f9499cf601ff4f666de1c943daa1f664d8d88fe06643" Dec 13 14:29:01.009116 env[1231]: time="2024-12-13T14:29:01.009054264Z" level=info msg="StopPodSandbox for \"adb123cef83f66509da4f9499cf601ff4f666de1c943daa1f664d8d88fe06643\"" Dec 13 14:29:01.033330 env[1231]: time="2024-12-13T14:29:01.033263877Z" level=error msg="StopPodSandbox for \"adb123cef83f66509da4f9499cf601ff4f666de1c943daa1f664d8d88fe06643\" failed" error="failed to destroy network for sandbox \"adb123cef83f66509da4f9499cf601ff4f666de1c943daa1f664d8d88fe06643\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:29:01.033580 kubelet[2075]: E1213 14:29:01.033545 2075 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"adb123cef83f66509da4f9499cf601ff4f666de1c943daa1f664d8d88fe06643\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="adb123cef83f66509da4f9499cf601ff4f666de1c943daa1f664d8d88fe06643" Dec 13 14:29:01.033629 kubelet[2075]: E1213 14:29:01.033599 2075 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"adb123cef83f66509da4f9499cf601ff4f666de1c943daa1f664d8d88fe06643"} Dec 13 14:29:01.033654 kubelet[2075]: E1213 14:29:01.033632 2075 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d48acee9-c06b-4aaa-a5e2-0d0779dceacf\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"adb123cef83f66509da4f9499cf601ff4f666de1c943daa1f664d8d88fe06643\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:29:01.033736 kubelet[2075]: E1213 14:29:01.033662 2075 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d48acee9-c06b-4aaa-a5e2-0d0779dceacf\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"adb123cef83f66509da4f9499cf601ff4f666de1c943daa1f664d8d88fe06643\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-tstdc" podUID="d48acee9-c06b-4aaa-a5e2-0d0779dceacf" Dec 13 14:29:03.855371 systemd[1]: Started sshd@10-10.0.0.112:22-10.0.0.1:47460.service. Dec 13 14:29:03.854000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.112:22-10.0.0.1:47460 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:03.856778 kernel: kauditd_printk_skb: 2 callbacks suppressed Dec 13 14:29:03.856847 kernel: audit: type=1130 audit(1734100143.854:1020): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.112:22-10.0.0.1:47460 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:03.901000 audit[3251]: USER_ACCT pid=3251 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:03.903227 sshd[3251]: Accepted publickey for core from 10.0.0.1 port 47460 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:29:03.906930 sshd[3251]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:29:03.905000 audit[3251]: CRED_ACQ pid=3251 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:03.911902 systemd-logind[1219]: New session 11 of user core. Dec 13 14:29:03.912765 systemd[1]: Started session-11.scope. Dec 13 14:29:03.913214 kernel: audit: type=1101 audit(1734100143.901:1021): pid=3251 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:03.913268 kernel: audit: type=1103 audit(1734100143.905:1022): pid=3251 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:03.913293 kernel: audit: type=1006 audit(1734100143.905:1023): pid=3251 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Dec 13 14:29:03.905000 audit[3251]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff9682920 a2=3 a3=0 items=0 ppid=1 pid=3251 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:03.924998 kernel: audit: type=1300 audit(1734100143.905:1023): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff9682920 a2=3 a3=0 items=0 ppid=1 pid=3251 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:03.925060 kernel: audit: type=1327 audit(1734100143.905:1023): proctitle=737368643A20636F7265205B707269765D Dec 13 14:29:03.905000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:29:03.917000 audit[3251]: USER_START pid=3251 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:03.931360 kernel: audit: type=1105 audit(1734100143.917:1024): pid=3251 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:03.931443 kernel: audit: type=1103 audit(1734100143.918:1025): pid=3253 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:03.918000 audit[3253]: CRED_ACQ pid=3253 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:04.034647 sshd[3251]: pam_unix(sshd:session): session closed for user core Dec 13 14:29:04.034000 audit[3251]: USER_END pid=3251 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:04.037775 systemd[1]: sshd@10-10.0.0.112:22-10.0.0.1:47460.service: Deactivated successfully. Dec 13 14:29:04.038761 systemd[1]: session-11.scope: Deactivated successfully. Dec 13 14:29:04.039707 systemd-logind[1219]: Session 11 logged out. Waiting for processes to exit. Dec 13 14:29:04.040754 systemd-logind[1219]: Removed session 11. Dec 13 14:29:04.034000 audit[3251]: CRED_DISP pid=3251 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:04.045798 kernel: audit: type=1106 audit(1734100144.034:1026): pid=3251 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:04.045993 kernel: audit: type=1104 audit(1734100144.034:1027): pid=3251 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:04.036000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.112:22-10.0.0.1:47460 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:09.039546 systemd[1]: Started sshd@11-10.0.0.112:22-10.0.0.1:56802.service. Dec 13 14:29:09.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.112:22-10.0.0.1:56802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:09.040796 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:29:09.040852 kernel: audit: type=1130 audit(1734100149.038:1029): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.112:22-10.0.0.1:56802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:09.093000 audit[3266]: USER_ACCT pid=3266 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:09.094493 sshd[3266]: Accepted publickey for core from 10.0.0.1 port 56802 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:29:09.105156 kernel: audit: type=1101 audit(1734100149.093:1030): pid=3266 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:09.105729 sshd[3266]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:29:09.104000 audit[3266]: CRED_ACQ pid=3266 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:09.112467 kernel: audit: type=1103 audit(1734100149.104:1031): pid=3266 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:09.113042 kernel: audit: type=1006 audit(1734100149.104:1032): pid=3266 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Dec 13 14:29:09.113350 kernel: audit: type=1300 audit(1734100149.104:1032): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2aaf9220 a2=3 a3=0 items=0 ppid=1 pid=3266 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:09.104000 audit[3266]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2aaf9220 a2=3 a3=0 items=0 ppid=1 pid=3266 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:09.116637 systemd[1]: Started session-12.scope. Dec 13 14:29:09.104000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:29:09.117525 systemd-logind[1219]: New session 12 of user core. Dec 13 14:29:09.119193 kernel: audit: type=1327 audit(1734100149.104:1032): proctitle=737368643A20636F7265205B707269765D Dec 13 14:29:09.126000 audit[3266]: USER_START pid=3266 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:09.130000 audit[3268]: CRED_ACQ pid=3268 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:09.137665 kernel: audit: type=1105 audit(1734100149.126:1033): pid=3266 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:09.137792 kernel: audit: type=1103 audit(1734100149.130:1034): pid=3268 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:09.256577 sshd[3266]: pam_unix(sshd:session): session closed for user core Dec 13 14:29:09.256000 audit[3266]: USER_END pid=3266 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:09.260101 systemd[1]: Started sshd@12-10.0.0.112:22-10.0.0.1:56808.service. Dec 13 14:29:09.260854 systemd[1]: sshd@11-10.0.0.112:22-10.0.0.1:56802.service: Deactivated successfully. Dec 13 14:29:09.261770 systemd[1]: session-12.scope: Deactivated successfully. Dec 13 14:29:09.268115 kernel: audit: type=1106 audit(1734100149.256:1035): pid=3266 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:09.269157 systemd-logind[1219]: Session 12 logged out. Waiting for processes to exit. Dec 13 14:29:09.257000 audit[3266]: CRED_DISP pid=3266 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:09.270494 systemd-logind[1219]: Removed session 12. Dec 13 14:29:09.259000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.112:22-10.0.0.1:56808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:09.260000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.112:22-10.0.0.1:56802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:09.275096 kernel: audit: type=1104 audit(1734100149.257:1036): pid=3266 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:09.290000 audit[3279]: USER_ACCT pid=3279 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:09.291709 sshd[3279]: Accepted publickey for core from 10.0.0.1 port 56808 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:29:09.291000 audit[3279]: CRED_ACQ pid=3279 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:09.292000 audit[3279]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc31552300 a2=3 a3=0 items=0 ppid=1 pid=3279 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:09.292000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:29:09.293530 sshd[3279]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:29:09.296806 systemd-logind[1219]: New session 13 of user core. Dec 13 14:29:09.297588 systemd[1]: Started session-13.scope. Dec 13 14:29:09.300000 audit[3279]: USER_START pid=3279 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:09.302000 audit[3282]: CRED_ACQ pid=3282 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:09.487123 sshd[3279]: pam_unix(sshd:session): session closed for user core Dec 13 14:29:09.487000 audit[3279]: USER_END pid=3279 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:09.487000 audit[3279]: CRED_DISP pid=3279 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:09.490732 systemd[1]: Started sshd@13-10.0.0.112:22-10.0.0.1:56822.service. Dec 13 14:29:09.489000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.112:22-10.0.0.1:56822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:09.491287 systemd[1]: sshd@12-10.0.0.112:22-10.0.0.1:56808.service: Deactivated successfully. Dec 13 14:29:09.490000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.112:22-10.0.0.1:56808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:09.491975 systemd[1]: session-13.scope: Deactivated successfully. Dec 13 14:29:09.492573 systemd-logind[1219]: Session 13 logged out. Waiting for processes to exit. Dec 13 14:29:09.493953 systemd-logind[1219]: Removed session 13. Dec 13 14:29:09.524000 audit[3291]: USER_ACCT pid=3291 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:09.525346 sshd[3291]: Accepted publickey for core from 10.0.0.1 port 56822 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:29:09.525000 audit[3291]: CRED_ACQ pid=3291 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:09.525000 audit[3291]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff0a1cee50 a2=3 a3=0 items=0 ppid=1 pid=3291 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:09.525000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:29:09.526938 sshd[3291]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:29:09.530385 systemd-logind[1219]: New session 14 of user core. Dec 13 14:29:09.531166 systemd[1]: Started session-14.scope. Dec 13 14:29:09.534000 audit[3291]: USER_START pid=3291 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:09.535000 audit[3294]: CRED_ACQ pid=3294 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:09.705726 sshd[3291]: pam_unix(sshd:session): session closed for user core Dec 13 14:29:09.706000 audit[3291]: USER_END pid=3291 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:09.706000 audit[3291]: CRED_DISP pid=3291 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:09.709282 systemd[1]: sshd@13-10.0.0.112:22-10.0.0.1:56822.service: Deactivated successfully. Dec 13 14:29:09.708000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.112:22-10.0.0.1:56822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:09.709981 systemd[1]: session-14.scope: Deactivated successfully. Dec 13 14:29:09.710797 systemd-logind[1219]: Session 14 logged out. Waiting for processes to exit. Dec 13 14:29:09.711801 systemd-logind[1219]: Removed session 14. Dec 13 14:29:10.902656 env[1231]: time="2024-12-13T14:29:10.902589201Z" level=info msg="StopPodSandbox for \"3365bcbfb0c17dc5eb8337e4c1f6c2b8025fbd68da45bd7a93c55d755ee1543c\"" Dec 13 14:29:10.938880 env[1231]: time="2024-12-13T14:29:10.938799761Z" level=error msg="StopPodSandbox for \"3365bcbfb0c17dc5eb8337e4c1f6c2b8025fbd68da45bd7a93c55d755ee1543c\" failed" error="failed to destroy network for sandbox \"3365bcbfb0c17dc5eb8337e4c1f6c2b8025fbd68da45bd7a93c55d755ee1543c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:29:10.939170 kubelet[2075]: E1213 14:29:10.939138 2075 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3365bcbfb0c17dc5eb8337e4c1f6c2b8025fbd68da45bd7a93c55d755ee1543c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3365bcbfb0c17dc5eb8337e4c1f6c2b8025fbd68da45bd7a93c55d755ee1543c" Dec 13 14:29:10.939569 kubelet[2075]: E1213 14:29:10.939190 2075 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3365bcbfb0c17dc5eb8337e4c1f6c2b8025fbd68da45bd7a93c55d755ee1543c"} Dec 13 14:29:10.939569 kubelet[2075]: E1213 14:29:10.939234 2075 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"77b0e9b3-1aa6-45f0-8681-3e913425307b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3365bcbfb0c17dc5eb8337e4c1f6c2b8025fbd68da45bd7a93c55d755ee1543c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:29:10.939569 kubelet[2075]: E1213 14:29:10.939281 2075 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"77b0e9b3-1aa6-45f0-8681-3e913425307b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3365bcbfb0c17dc5eb8337e4c1f6c2b8025fbd68da45bd7a93c55d755ee1543c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6fdbbd74b4-qmlf8" podUID="77b0e9b3-1aa6-45f0-8681-3e913425307b" Dec 13 14:29:11.118307 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount196050536.mount: Deactivated successfully. Dec 13 14:29:11.902685 env[1231]: time="2024-12-13T14:29:11.902627934Z" level=info msg="StopPodSandbox for \"e748bd5aa30256f12d4430cae505697bd2b9a24d37b89947f82c485c4caee13a\"" Dec 13 14:29:11.903756 env[1231]: time="2024-12-13T14:29:11.902710013Z" level=info msg="StopPodSandbox for \"b0d2329f241ed52341e0e83a277c3646764f348f830084ca33c5b023fec4fbed\"" Dec 13 14:29:12.660184 env[1231]: time="2024-12-13T14:29:12.660098322Z" level=error msg="StopPodSandbox for \"b0d2329f241ed52341e0e83a277c3646764f348f830084ca33c5b023fec4fbed\" failed" error="failed to destroy network for sandbox \"b0d2329f241ed52341e0e83a277c3646764f348f830084ca33c5b023fec4fbed\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:29:12.660399 kubelet[2075]: E1213 14:29:12.660378 2075 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b0d2329f241ed52341e0e83a277c3646764f348f830084ca33c5b023fec4fbed\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b0d2329f241ed52341e0e83a277c3646764f348f830084ca33c5b023fec4fbed" Dec 13 14:29:12.660789 kubelet[2075]: E1213 14:29:12.660428 2075 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b0d2329f241ed52341e0e83a277c3646764f348f830084ca33c5b023fec4fbed"} Dec 13 14:29:12.660789 kubelet[2075]: E1213 14:29:12.660477 2075 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ff87d310-5f73-4992-8cd9-347d96eba088\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b0d2329f241ed52341e0e83a277c3646764f348f830084ca33c5b023fec4fbed\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:29:12.660789 kubelet[2075]: E1213 14:29:12.660518 2075 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ff87d310-5f73-4992-8cd9-347d96eba088\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b0d2329f241ed52341e0e83a277c3646764f348f830084ca33c5b023fec4fbed\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6fdbbd74b4-s4mbj" podUID="ff87d310-5f73-4992-8cd9-347d96eba088" Dec 13 14:29:12.660962 env[1231]: time="2024-12-13T14:29:12.660700286Z" level=error msg="StopPodSandbox for \"e748bd5aa30256f12d4430cae505697bd2b9a24d37b89947f82c485c4caee13a\" failed" error="failed to destroy network for sandbox \"e748bd5aa30256f12d4430cae505697bd2b9a24d37b89947f82c485c4caee13a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:29:12.660994 kubelet[2075]: E1213 14:29:12.660852 2075 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e748bd5aa30256f12d4430cae505697bd2b9a24d37b89947f82c485c4caee13a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e748bd5aa30256f12d4430cae505697bd2b9a24d37b89947f82c485c4caee13a" Dec 13 14:29:12.660994 kubelet[2075]: E1213 14:29:12.660880 2075 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e748bd5aa30256f12d4430cae505697bd2b9a24d37b89947f82c485c4caee13a"} Dec 13 14:29:12.660994 kubelet[2075]: E1213 14:29:12.660917 2075 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c769c3a1-a661-47f5-890d-b6c9415fb6c6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e748bd5aa30256f12d4430cae505697bd2b9a24d37b89947f82c485c4caee13a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:29:12.661176 kubelet[2075]: E1213 14:29:12.661014 2075 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c769c3a1-a661-47f5-890d-b6c9415fb6c6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e748bd5aa30256f12d4430cae505697bd2b9a24d37b89947f82c485c4caee13a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-78f4954bf9-7pxmq" podUID="c769c3a1-a661-47f5-890d-b6c9415fb6c6" Dec 13 14:29:12.684742 env[1231]: time="2024-12-13T14:29:12.684670147Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:12.687820 env[1231]: time="2024-12-13T14:29:12.687781947Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:12.690327 env[1231]: time="2024-12-13T14:29:12.690204804Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:12.692357 env[1231]: time="2024-12-13T14:29:12.692319234Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:12.692929 env[1231]: time="2024-12-13T14:29:12.692884277Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 14:29:12.703964 env[1231]: time="2024-12-13T14:29:12.703901000Z" level=info msg="CreateContainer within sandbox \"b5b42eda82b8c02525b057c175b4554dd42f33e624d5a9a59fe508104733fd2a\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:29:12.789056 env[1231]: time="2024-12-13T14:29:12.788951062Z" level=info msg="CreateContainer within sandbox \"b5b42eda82b8c02525b057c175b4554dd42f33e624d5a9a59fe508104733fd2a\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"930876467bffa420e6b0311a62fe73b89860ac98609dc9e8b0bc5564b0dc6b8e\"" Dec 13 14:29:12.790104 env[1231]: time="2024-12-13T14:29:12.790050860Z" level=info msg="StartContainer for \"930876467bffa420e6b0311a62fe73b89860ac98609dc9e8b0bc5564b0dc6b8e\"" Dec 13 14:29:12.819900 systemd[1]: Started cri-containerd-930876467bffa420e6b0311a62fe73b89860ac98609dc9e8b0bc5564b0dc6b8e.scope. Dec 13 14:29:12.845000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.845000 audit[3384]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f34a0338958 items=0 ppid=2542 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:12.845000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933303837363436376266666134323065366230333131613632666537 Dec 13 14:29:12.845000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.845000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.845000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.845000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.845000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.845000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.845000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.845000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.845000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.845000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.845000 audit: BPF prog-id=136 op=LOAD Dec 13 14:29:12.845000 audit[3384]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c000282898 items=0 ppid=2542 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:12.845000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933303837363436376266666134323065366230333131613632666537 Dec 13 14:29:12.845000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.845000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.845000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.845000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.845000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.845000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.845000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.845000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.845000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.845000 audit: BPF prog-id=137 op=LOAD Dec 13 14:29:12.845000 audit[3384]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0002828e8 items=0 ppid=2542 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:12.845000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933303837363436376266666134323065366230333131613632666537 Dec 13 14:29:12.845000 audit: BPF prog-id=137 op=UNLOAD Dec 13 14:29:12.845000 audit: BPF prog-id=136 op=UNLOAD Dec 13 14:29:12.845000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.845000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.845000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.845000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.845000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.845000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.845000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.845000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.845000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.845000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:12.845000 audit: BPF prog-id=138 op=LOAD Dec 13 14:29:12.845000 audit[3384]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c000282978 items=0 ppid=2542 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:12.845000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933303837363436376266666134323065366230333131613632666537 Dec 13 14:29:12.902666 env[1231]: time="2024-12-13T14:29:12.902617283Z" level=info msg="StopPodSandbox for \"adb123cef83f66509da4f9499cf601ff4f666de1c943daa1f664d8d88fe06643\"" Dec 13 14:29:12.903151 env[1231]: time="2024-12-13T14:29:12.903129845Z" level=info msg="StopPodSandbox for \"73c809ecb32e20add5ba2387a36fe05c5f2439b3c82355a300a062a4708b6126\"" Dec 13 14:29:12.938348 env[1231]: time="2024-12-13T14:29:12.935118469Z" level=info msg="StartContainer for \"930876467bffa420e6b0311a62fe73b89860ac98609dc9e8b0bc5564b0dc6b8e\" returns successfully" Dec 13 14:29:12.946139 env[1231]: time="2024-12-13T14:29:12.945562112Z" level=error msg="StopPodSandbox for \"adb123cef83f66509da4f9499cf601ff4f666de1c943daa1f664d8d88fe06643\" failed" error="failed to destroy network for sandbox \"adb123cef83f66509da4f9499cf601ff4f666de1c943daa1f664d8d88fe06643\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:29:12.946295 kubelet[2075]: E1213 14:29:12.945917 2075 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"adb123cef83f66509da4f9499cf601ff4f666de1c943daa1f664d8d88fe06643\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="adb123cef83f66509da4f9499cf601ff4f666de1c943daa1f664d8d88fe06643" Dec 13 14:29:12.946295 kubelet[2075]: E1213 14:29:12.945983 2075 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"adb123cef83f66509da4f9499cf601ff4f666de1c943daa1f664d8d88fe06643"} Dec 13 14:29:12.946295 kubelet[2075]: E1213 14:29:12.946038 2075 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d48acee9-c06b-4aaa-a5e2-0d0779dceacf\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"adb123cef83f66509da4f9499cf601ff4f666de1c943daa1f664d8d88fe06643\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:29:12.946295 kubelet[2075]: E1213 14:29:12.946096 2075 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d48acee9-c06b-4aaa-a5e2-0d0779dceacf\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"adb123cef83f66509da4f9499cf601ff4f666de1c943daa1f664d8d88fe06643\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-tstdc" podUID="d48acee9-c06b-4aaa-a5e2-0d0779dceacf" Dec 13 14:29:12.952299 env[1231]: time="2024-12-13T14:29:12.952234239Z" level=error msg="StopPodSandbox for \"73c809ecb32e20add5ba2387a36fe05c5f2439b3c82355a300a062a4708b6126\" failed" error="failed to destroy network for sandbox \"73c809ecb32e20add5ba2387a36fe05c5f2439b3c82355a300a062a4708b6126\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:29:12.952764 kubelet[2075]: E1213 14:29:12.952721 2075 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"73c809ecb32e20add5ba2387a36fe05c5f2439b3c82355a300a062a4708b6126\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="73c809ecb32e20add5ba2387a36fe05c5f2439b3c82355a300a062a4708b6126" Dec 13 14:29:12.952847 kubelet[2075]: E1213 14:29:12.952781 2075 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"73c809ecb32e20add5ba2387a36fe05c5f2439b3c82355a300a062a4708b6126"} Dec 13 14:29:12.952847 kubelet[2075]: E1213 14:29:12.952834 2075 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d1f940d3-bfb4-4c44-ba58-bdb360e4465a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"73c809ecb32e20add5ba2387a36fe05c5f2439b3c82355a300a062a4708b6126\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:29:12.952961 kubelet[2075]: E1213 14:29:12.952875 2075 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d1f940d3-bfb4-4c44-ba58-bdb360e4465a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"73c809ecb32e20add5ba2387a36fe05c5f2439b3c82355a300a062a4708b6126\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-flvr8" podUID="d1f940d3-bfb4-4c44-ba58-bdb360e4465a" Dec 13 14:29:12.968224 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 14:29:12.968401 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 14:29:13.036961 kubelet[2075]: E1213 14:29:13.036896 2075 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:29:13.118225 kubelet[2075]: I1213 14:29:13.117682 2075 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-5q62t" podStartSLOduration=1.045171285 podStartE2EDuration="35.11762967s" podCreationTimestamp="2024-12-13 14:28:38 +0000 UTC" firstStartedPulling="2024-12-13 14:28:38.62079169 +0000 UTC m=+21.809527035" lastFinishedPulling="2024-12-13 14:29:12.693250065 +0000 UTC m=+55.881985420" observedRunningTime="2024-12-13 14:29:13.117023878 +0000 UTC m=+56.305759253" watchObservedRunningTime="2024-12-13 14:29:13.11762967 +0000 UTC m=+56.306365025" Dec 13 14:29:13.231000 audit[1953]: AVC avc: denied { watch } for pid=1953 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8232 scontext=system_u:system_r:svirt_lxc_net_t:s0:c591,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:29:13.231000 audit[1953]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0005429f0 a2=fc6 a3=0 items=0 ppid=1804 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c591,c683 key=(null) Dec 13 14:29:13.231000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:29:13.231000 audit[1953]: AVC avc: denied { watch } for pid=1953 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c591,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:29:13.231000 audit[1953]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000d81060 a2=fc6 a3=0 items=0 ppid=1804 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c591,c683 key=(null) Dec 13 14:29:13.231000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:29:13.311000 audit[1960]: AVC avc: denied { watch } for pid=1960 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=8228 scontext=system_u:system_r:svirt_lxc_net_t:s0:c215,c471 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:29:13.311000 audit[1960]: AVC avc: denied { watch } for pid=1960 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8232 scontext=system_u:system_r:svirt_lxc_net_t:s0:c215,c471 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:29:13.311000 audit[1960]: AVC avc: denied { watch } for pid=1960 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c215,c471 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:29:13.311000 audit[1960]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c00e1dd820 a2=fc6 a3=0 items=0 ppid=1772 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c215,c471 key=(null) Dec 13 14:29:13.311000 audit[1960]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c008a594d0 a2=fc6 a3=0 items=0 ppid=1772 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c215,c471 key=(null) Dec 13 14:29:13.311000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:29:13.311000 audit[1960]: AVC avc: denied { watch } for pid=1960 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c215,c471 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:29:13.311000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:29:13.311000 audit[1960]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c00e182c00 a2=fc6 a3=0 items=0 ppid=1772 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c215,c471 key=(null) Dec 13 14:29:13.311000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:29:13.311000 audit[1960]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00607c930 a2=fc6 a3=0 items=0 ppid=1772 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c215,c471 key=(null) Dec 13 14:29:13.311000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:29:13.313000 audit[1960]: AVC avc: denied { watch } for pid=1960 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c215,c471 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:29:13.313000 audit[1960]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c003d69300 a2=fc6 a3=0 items=0 ppid=1772 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c215,c471 key=(null) Dec 13 14:29:13.313000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:29:13.315000 audit[1960]: AVC avc: denied { watch } for pid=1960 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8232 scontext=system_u:system_r:svirt_lxc_net_t:s0:c215,c471 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:29:13.315000 audit[1960]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c008a59560 a2=fc6 a3=0 items=0 ppid=1772 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c215,c471 key=(null) Dec 13 14:29:13.315000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:29:14.039121 kubelet[2075]: E1213 14:29:14.039016 2075 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:29:14.263000 audit[3582]: AVC avc: denied { write } for pid=3582 comm="tee" name="fd" dev="proc" ino=25960 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:29:14.265805 kernel: kauditd_printk_skb: 90 callbacks suppressed Dec 13 14:29:14.265866 kernel: audit: type=1400 audit(1734100154.263:1070): avc: denied { write } for pid=3582 comm="tee" name="fd" dev="proc" ino=25960 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:29:14.263000 audit[3582]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe945aea30 a2=241 a3=1b6 items=1 ppid=3543 pid=3582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.273662 kernel: audit: type=1300 audit(1734100154.263:1070): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe945aea30 a2=241 a3=1b6 items=1 ppid=3543 pid=3582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.273743 kernel: audit: type=1307 audit(1734100154.263:1070): cwd="/etc/service/enabled/cni/log" Dec 13 14:29:14.263000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 14:29:14.263000 audit: PATH item=0 name="/dev/fd/63" inode=25067 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:14.278358 kernel: audit: type=1302 audit(1734100154.263:1070): item=0 name="/dev/fd/63" inode=25067 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:14.278458 kernel: audit: type=1327 audit(1734100154.263:1070): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:29:14.263000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:29:14.267000 audit[3580]: AVC avc: denied { write } for pid=3580 comm="tee" name="fd" dev="proc" ino=26915 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:29:14.284936 kernel: audit: type=1400 audit(1734100154.267:1071): avc: denied { write } for pid=3580 comm="tee" name="fd" dev="proc" ino=26915 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:29:14.267000 audit[3580]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc666e4a1e a2=241 a3=1b6 items=1 ppid=3544 pid=3580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.267000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:29:14.292476 kernel: audit: type=1300 audit(1734100154.267:1071): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc666e4a1e a2=241 a3=1b6 items=1 ppid=3544 pid=3580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.292546 kernel: audit: type=1307 audit(1734100154.267:1071): cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:29:14.267000 audit: PATH item=0 name="/dev/fd/63" inode=26908 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:14.295713 kernel: audit: type=1302 audit(1734100154.267:1071): item=0 name="/dev/fd/63" inode=26908 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:14.296105 kernel: audit: type=1327 audit(1734100154.267:1071): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:29:14.267000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:29:14.284000 audit[3590]: AVC avc: denied { write } for pid=3590 comm="tee" name="fd" dev="proc" ino=26928 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:29:14.284000 audit[3590]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe15038a2e a2=241 a3=1b6 items=1 ppid=3548 pid=3590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.284000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 14:29:14.284000 audit: PATH item=0 name="/dev/fd/63" inode=26910 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:14.284000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:29:14.300000 audit[3621]: AVC avc: denied { write } for pid=3621 comm="tee" name="fd" dev="proc" ino=25073 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:29:14.300000 audit[3621]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc25807a1f a2=241 a3=1b6 items=1 ppid=3558 pid=3621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.300000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 14:29:14.300000 audit: PATH item=0 name="/dev/fd/63" inode=24385 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:14.300000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:29:14.312000 audit[3609]: AVC avc: denied { write } for pid=3609 comm="tee" name="fd" dev="proc" ino=26934 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:29:14.313000 audit[3611]: AVC avc: denied { write } for pid=3611 comm="tee" name="fd" dev="proc" ino=25077 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:29:14.313000 audit[3611]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd2ad8aa2e a2=241 a3=1b6 items=1 ppid=3551 pid=3611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.313000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 14:29:14.313000 audit: PATH item=0 name="/dev/fd/63" inode=26925 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:14.313000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:29:14.312000 audit[3609]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffdeaf2a2f a2=241 a3=1b6 items=1 ppid=3562 pid=3609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.312000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 14:29:14.312000 audit: PATH item=0 name="/dev/fd/63" inode=26922 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:14.312000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:29:14.317000 audit[3618]: AVC avc: denied { write } for pid=3618 comm="tee" name="fd" dev="proc" ino=25082 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:29:14.317000 audit[3618]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc2de21a2e a2=241 a3=1b6 items=1 ppid=3546 pid=3618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.317000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 14:29:14.317000 audit: PATH item=0 name="/dev/fd/63" inode=26931 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:14.317000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:29:14.407000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.407000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.407000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.407000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.407000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.407000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.407000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.407000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.407000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.407000 audit: BPF prog-id=139 op=LOAD Dec 13 14:29:14.407000 audit[3656]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffa0904270 a2=98 a3=3 items=0 ppid=3550 pid=3656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.407000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:14.407000 audit: BPF prog-id=139 op=UNLOAD Dec 13 14:29:14.407000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.407000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.407000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.407000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.407000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.407000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.407000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.407000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.407000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.407000 audit: BPF prog-id=140 op=LOAD Dec 13 14:29:14.407000 audit[3656]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffa0904050 a2=74 a3=540051 items=0 ppid=3550 pid=3656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.407000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:14.407000 audit: BPF prog-id=140 op=UNLOAD Dec 13 14:29:14.407000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.407000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.407000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.407000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.407000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.407000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.407000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.407000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.407000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.407000 audit: BPF prog-id=141 op=LOAD Dec 13 14:29:14.407000 audit[3656]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffa0904080 a2=94 a3=2 items=0 ppid=3550 pid=3656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.407000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:14.407000 audit: BPF prog-id=141 op=UNLOAD Dec 13 14:29:14.521000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.521000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.521000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.521000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.521000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.521000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.521000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.521000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.521000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.521000 audit: BPF prog-id=142 op=LOAD Dec 13 14:29:14.521000 audit[3656]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffa0903f40 a2=40 a3=1 items=0 ppid=3550 pid=3656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.521000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:14.521000 audit: BPF prog-id=142 op=UNLOAD Dec 13 14:29:14.521000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.521000 audit[3656]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fffa0904010 a2=50 a3=7fffa09040f0 items=0 ppid=3550 pid=3656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.521000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:14.529000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.529000 audit[3656]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffa0903f50 a2=28 a3=0 items=0 ppid=3550 pid=3656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.529000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:14.529000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.529000 audit[3656]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffa0903f80 a2=28 a3=0 items=0 ppid=3550 pid=3656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.529000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:14.529000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.529000 audit[3656]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffa0903e90 a2=28 a3=0 items=0 ppid=3550 pid=3656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.529000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:14.529000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.529000 audit[3656]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffa0903fa0 a2=28 a3=0 items=0 ppid=3550 pid=3656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.529000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:14.529000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.529000 audit[3656]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffa0903f80 a2=28 a3=0 items=0 ppid=3550 pid=3656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.529000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:14.529000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.529000 audit[3656]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffa0903f70 a2=28 a3=0 items=0 ppid=3550 pid=3656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.529000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:14.529000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.529000 audit[3656]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffa0903fa0 a2=28 a3=0 items=0 ppid=3550 pid=3656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.529000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:14.529000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.529000 audit[3656]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffa0903f80 a2=28 a3=0 items=0 ppid=3550 pid=3656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.529000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:14.529000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.529000 audit[3656]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffa0903fa0 a2=28 a3=0 items=0 ppid=3550 pid=3656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.529000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:14.529000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.529000 audit[3656]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffa0903f70 a2=28 a3=0 items=0 ppid=3550 pid=3656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.529000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:14.529000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.529000 audit[3656]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffa0903fe0 a2=28 a3=0 items=0 ppid=3550 pid=3656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.529000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:14.529000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.529000 audit[3656]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffa0903d90 a2=50 a3=1 items=0 ppid=3550 pid=3656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.529000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:14.529000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.529000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.529000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.529000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.529000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.529000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.529000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.529000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.529000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.529000 audit: BPF prog-id=143 op=LOAD Dec 13 14:29:14.529000 audit[3656]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffa0903d90 a2=94 a3=5 items=0 ppid=3550 pid=3656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.529000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:14.529000 audit: BPF prog-id=143 op=UNLOAD Dec 13 14:29:14.529000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.529000 audit[3656]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffa0903e40 a2=50 a3=1 items=0 ppid=3550 pid=3656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.529000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:14.529000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.529000 audit[3656]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fffa0903f60 a2=4 a3=38 items=0 ppid=3550 pid=3656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.529000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:14.529000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.529000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.529000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.529000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.529000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.529000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.529000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.529000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.529000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.529000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.529000 audit[3656]: AVC avc: denied { confidentiality } for pid=3656 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:14.529000 audit[3656]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffa0903fb0 a2=94 a3=6 items=0 ppid=3550 pid=3656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.529000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:14.530000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.530000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.530000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.530000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.530000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.530000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.530000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.530000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.530000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.530000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.530000 audit[3656]: AVC avc: denied { confidentiality } for pid=3656 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:14.530000 audit[3656]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffa0903760 a2=94 a3=83 items=0 ppid=3550 pid=3656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.530000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:14.530000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.530000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.530000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.530000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.530000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.530000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.530000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.530000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.530000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.530000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.530000 audit[3656]: AVC avc: denied { confidentiality } for pid=3656 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:14.530000 audit[3656]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffa0903760 a2=94 a3=83 items=0 ppid=3550 pid=3656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.530000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:29:14.538000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.538000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.538000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.538000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.538000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.538000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.538000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.538000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.538000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.538000 audit: BPF prog-id=144 op=LOAD Dec 13 14:29:14.538000 audit[3662]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff0e4205e0 a2=98 a3=1999999999999999 items=0 ppid=3550 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.538000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:29:14.538000 audit: BPF prog-id=144 op=UNLOAD Dec 13 14:29:14.538000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.538000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.538000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.538000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.538000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.538000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.538000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.538000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.538000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.538000 audit: BPF prog-id=145 op=LOAD Dec 13 14:29:14.538000 audit[3662]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff0e4204c0 a2=74 a3=ffff items=0 ppid=3550 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.538000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:29:14.538000 audit: BPF prog-id=145 op=UNLOAD Dec 13 14:29:14.538000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.538000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.538000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.538000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.538000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.538000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.538000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.538000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.538000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.538000 audit: BPF prog-id=146 op=LOAD Dec 13 14:29:14.538000 audit[3662]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff0e420500 a2=40 a3=7fff0e4206e0 items=0 ppid=3550 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.538000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:29:14.538000 audit: BPF prog-id=146 op=UNLOAD Dec 13 14:29:14.593234 systemd-networkd[1047]: vxlan.calico: Link UP Dec 13 14:29:14.593244 systemd-networkd[1047]: vxlan.calico: Gained carrier Dec 13 14:29:14.622000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.622000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.622000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.622000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.622000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.622000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.622000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.622000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.622000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.622000 audit: BPF prog-id=147 op=LOAD Dec 13 14:29:14.622000 audit[3690]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdaea54240 a2=98 a3=ffffffff items=0 ppid=3550 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.622000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:14.622000 audit: BPF prog-id=147 op=UNLOAD Dec 13 14:29:14.622000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.622000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.622000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.622000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.622000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.622000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.622000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.622000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.622000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.622000 audit: BPF prog-id=148 op=LOAD Dec 13 14:29:14.622000 audit[3690]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdaea54050 a2=74 a3=540051 items=0 ppid=3550 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.622000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:14.622000 audit: BPF prog-id=148 op=UNLOAD Dec 13 14:29:14.622000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.622000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.622000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.622000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.622000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.622000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.622000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.622000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.622000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.622000 audit: BPF prog-id=149 op=LOAD Dec 13 14:29:14.622000 audit[3690]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdaea54080 a2=94 a3=2 items=0 ppid=3550 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.622000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:14.622000 audit: BPF prog-id=149 op=UNLOAD Dec 13 14:29:14.622000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.622000 audit[3690]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdaea53f50 a2=28 a3=0 items=0 ppid=3550 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.622000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:14.622000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.622000 audit[3690]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdaea53f80 a2=28 a3=0 items=0 ppid=3550 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.622000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:14.622000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.622000 audit[3690]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdaea53e90 a2=28 a3=0 items=0 ppid=3550 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.622000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:14.622000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.622000 audit[3690]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdaea53fa0 a2=28 a3=0 items=0 ppid=3550 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.622000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:14.622000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.622000 audit[3690]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdaea53f80 a2=28 a3=0 items=0 ppid=3550 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.622000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:14.622000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.622000 audit[3690]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdaea53f70 a2=28 a3=0 items=0 ppid=3550 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.622000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:14.622000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.622000 audit[3690]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdaea53fa0 a2=28 a3=0 items=0 ppid=3550 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.622000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:14.622000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.622000 audit[3690]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdaea53f80 a2=28 a3=0 items=0 ppid=3550 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.622000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:14.623000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.623000 audit[3690]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdaea53fa0 a2=28 a3=0 items=0 ppid=3550 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.623000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:14.623000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.623000 audit[3690]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdaea53f70 a2=28 a3=0 items=0 ppid=3550 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.623000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:14.623000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.623000 audit[3690]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdaea53fe0 a2=28 a3=0 items=0 ppid=3550 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.623000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:14.623000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.623000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.623000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.623000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.623000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.623000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.623000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.623000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.623000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.623000 audit: BPF prog-id=150 op=LOAD Dec 13 14:29:14.623000 audit[3690]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdaea53e50 a2=40 a3=0 items=0 ppid=3550 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.623000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:14.623000 audit: BPF prog-id=150 op=UNLOAD Dec 13 14:29:14.623000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.623000 audit[3690]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffdaea53e40 a2=50 a3=2800 items=0 ppid=3550 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.623000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:14.623000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.623000 audit[3690]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffdaea53e40 a2=50 a3=2800 items=0 ppid=3550 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.623000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:14.623000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.623000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.623000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.623000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.623000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.623000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.623000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.623000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.623000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.623000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.623000 audit: BPF prog-id=151 op=LOAD Dec 13 14:29:14.623000 audit[3690]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdaea53660 a2=94 a3=2 items=0 ppid=3550 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.623000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:14.623000 audit: BPF prog-id=151 op=UNLOAD Dec 13 14:29:14.623000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.623000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.623000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.623000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.623000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.623000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.623000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.623000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.623000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.623000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.623000 audit: BPF prog-id=152 op=LOAD Dec 13 14:29:14.623000 audit[3690]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdaea53760 a2=94 a3=2d items=0 ppid=3550 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.623000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:29:14.628000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.628000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.628000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.628000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.628000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.628000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.628000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.628000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.628000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.628000 audit: BPF prog-id=153 op=LOAD Dec 13 14:29:14.628000 audit[3693]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd8d0adc30 a2=98 a3=0 items=0 ppid=3550 pid=3693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.628000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:14.628000 audit: BPF prog-id=153 op=UNLOAD Dec 13 14:29:14.628000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.628000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.628000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.628000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.628000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.628000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.628000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.628000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.628000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.628000 audit: BPF prog-id=154 op=LOAD Dec 13 14:29:14.628000 audit[3693]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd8d0ada10 a2=74 a3=540051 items=0 ppid=3550 pid=3693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.628000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:14.629000 audit: BPF prog-id=154 op=UNLOAD Dec 13 14:29:14.629000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.629000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.629000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.629000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.629000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.629000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.629000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.629000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.629000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.629000 audit: BPF prog-id=155 op=LOAD Dec 13 14:29:14.629000 audit[3693]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd8d0ada40 a2=94 a3=2 items=0 ppid=3550 pid=3693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.629000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:14.629000 audit: BPF prog-id=155 op=UNLOAD Dec 13 14:29:14.710000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.112:22-10.0.0.1:56826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:14.711512 systemd[1]: Started sshd@14-10.0.0.112:22-10.0.0.1:56826.service. Dec 13 14:29:14.744000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.744000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.744000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.744000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.744000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.744000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.744000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.744000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.744000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.744000 audit: BPF prog-id=156 op=LOAD Dec 13 14:29:14.744000 audit[3693]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd8d0ad900 a2=40 a3=1 items=0 ppid=3550 pid=3693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.744000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:14.744000 audit: BPF prog-id=156 op=UNLOAD Dec 13 14:29:14.744000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.744000 audit[3693]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd8d0ad9d0 a2=50 a3=7ffd8d0adab0 items=0 ppid=3550 pid=3693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.744000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:14.747000 audit[3702]: USER_ACCT pid=3702 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:14.748868 sshd[3702]: Accepted publickey for core from 10.0.0.1 port 56826 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:29:14.749000 audit[3702]: CRED_ACQ pid=3702 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:14.749000 audit[3702]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa3231740 a2=3 a3=0 items=0 ppid=1 pid=3702 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.749000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:29:14.751006 sshd[3702]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:29:14.753000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.753000 audit[3693]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd8d0ad910 a2=28 a3=0 items=0 ppid=3550 pid=3693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.753000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:14.753000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.753000 audit[3693]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd8d0ad940 a2=28 a3=0 items=0 ppid=3550 pid=3693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.753000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:14.753000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.753000 audit[3693]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd8d0ad850 a2=28 a3=0 items=0 ppid=3550 pid=3693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.753000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:14.753000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.753000 audit[3693]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd8d0ad960 a2=28 a3=0 items=0 ppid=3550 pid=3693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.753000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:14.753000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.753000 audit[3693]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd8d0ad940 a2=28 a3=0 items=0 ppid=3550 pid=3693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.753000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:14.753000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.753000 audit[3693]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd8d0ad930 a2=28 a3=0 items=0 ppid=3550 pid=3693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.753000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:14.753000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.753000 audit[3693]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd8d0ad960 a2=28 a3=0 items=0 ppid=3550 pid=3693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.753000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:14.753000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.753000 audit[3693]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd8d0ad940 a2=28 a3=0 items=0 ppid=3550 pid=3693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.753000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:14.753000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.753000 audit[3693]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd8d0ad960 a2=28 a3=0 items=0 ppid=3550 pid=3693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.753000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:14.753000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.753000 audit[3693]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd8d0ad930 a2=28 a3=0 items=0 ppid=3550 pid=3693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.753000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:14.753000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.753000 audit[3693]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd8d0ad9a0 a2=28 a3=0 items=0 ppid=3550 pid=3693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.753000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:14.754000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.754000 audit[3693]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd8d0ad750 a2=50 a3=1 items=0 ppid=3550 pid=3693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.754000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:14.754000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.754000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.754000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.754000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.754000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.754000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.754000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.754000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.754000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.754000 audit: BPF prog-id=157 op=LOAD Dec 13 14:29:14.754000 audit[3693]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd8d0ad750 a2=94 a3=5 items=0 ppid=3550 pid=3693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.754000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:14.754000 audit: BPF prog-id=157 op=UNLOAD Dec 13 14:29:14.754000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.754000 audit[3693]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd8d0ad800 a2=50 a3=1 items=0 ppid=3550 pid=3693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.754000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:14.754000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.754000 audit[3693]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd8d0ad920 a2=4 a3=38 items=0 ppid=3550 pid=3693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.754000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:14.754000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.754000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.754000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.754000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.754000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.754000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.754000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.754000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.754000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.754000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.754000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:14.754000 audit[3693]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd8d0ad970 a2=94 a3=6 items=0 ppid=3550 pid=3693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.754000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:14.755000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.755000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.755000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.755000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.755000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.755000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.755000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.755000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.755000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.755000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.755000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:14.755000 audit[3693]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd8d0ad120 a2=94 a3=83 items=0 ppid=3550 pid=3693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.755000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:14.755000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.755000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.755000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.755000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.755000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.755000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.755000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.755000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.755000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.755000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.755000 audit[3693]: AVC avc: denied { confidentiality } for pid=3693 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:29:14.755000 audit[3693]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd8d0ad120 a2=94 a3=83 items=0 ppid=3550 pid=3693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.755000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:14.755000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.755000 audit[3693]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd8d0aeb60 a2=10 a3=208 items=0 ppid=3550 pid=3693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.755000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:14.755000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.755000 audit[3693]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd8d0aea00 a2=10 a3=3 items=0 ppid=3550 pid=3693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.755000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:14.755000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.755000 audit[3693]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd8d0ae9a0 a2=10 a3=3 items=0 ppid=3550 pid=3693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.755000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:14.755000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:14.755000 audit[3693]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd8d0ae9a0 a2=10 a3=7 items=0 ppid=3550 pid=3693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.755000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:29:14.756155 systemd[1]: Started session-15.scope. Dec 13 14:29:14.757758 systemd-logind[1219]: New session 15 of user core. Dec 13 14:29:14.762000 audit: BPF prog-id=152 op=UNLOAD Dec 13 14:29:14.765000 audit[3702]: USER_START pid=3702 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:14.766000 audit[3707]: CRED_ACQ pid=3707 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:14.803000 audit[3727]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=3727 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:29:14.803000 audit[3727]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffca9984550 a2=0 a3=7ffca998453c items=0 ppid=3550 pid=3727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.803000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:29:14.812000 audit[3726]: NETFILTER_CFG table=nat:98 family=2 entries=15 op=nft_register_chain pid=3726 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:29:14.812000 audit[3726]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffe5e9965b0 a2=0 a3=7ffe5e99659c items=0 ppid=3550 pid=3726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.812000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:29:14.812000 audit[3730]: NETFILTER_CFG table=filter:99 family=2 entries=39 op=nft_register_chain pid=3730 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:29:14.812000 audit[3730]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffcd0b40440 a2=0 a3=557190228000 items=0 ppid=3550 pid=3730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.812000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:29:14.814000 audit[3725]: NETFILTER_CFG table=raw:100 family=2 entries=21 op=nft_register_chain pid=3725 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:29:14.814000 audit[3725]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7fff04968220 a2=0 a3=7fff0496820c items=0 ppid=3550 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:14.814000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:29:14.893169 sshd[3702]: pam_unix(sshd:session): session closed for user core Dec 13 14:29:14.893000 audit[3702]: USER_END pid=3702 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:14.893000 audit[3702]: CRED_DISP pid=3702 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:14.895983 systemd[1]: sshd@14-10.0.0.112:22-10.0.0.1:56826.service: Deactivated successfully. Dec 13 14:29:14.895000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.112:22-10.0.0.1:56826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:14.896841 systemd[1]: session-15.scope: Deactivated successfully. Dec 13 14:29:14.897440 systemd-logind[1219]: Session 15 logged out. Waiting for processes to exit. Dec 13 14:29:14.898193 systemd-logind[1219]: Removed session 15. Dec 13 14:29:14.901864 env[1231]: time="2024-12-13T14:29:14.901824766Z" level=info msg="StopPodSandbox for \"1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4\"" Dec 13 14:29:15.078158 env[1231]: 2024-12-13 14:29:15.018 [INFO][3759] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4" Dec 13 14:29:15.078158 env[1231]: 2024-12-13 14:29:15.018 [INFO][3759] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4" iface="eth0" netns="/var/run/netns/cni-efb8f6f0-ec43-5421-e1de-93515c8622d8" Dec 13 14:29:15.078158 env[1231]: 2024-12-13 14:29:15.018 [INFO][3759] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4" iface="eth0" netns="/var/run/netns/cni-efb8f6f0-ec43-5421-e1de-93515c8622d8" Dec 13 14:29:15.078158 env[1231]: 2024-12-13 14:29:15.019 [INFO][3759] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4" iface="eth0" netns="/var/run/netns/cni-efb8f6f0-ec43-5421-e1de-93515c8622d8" Dec 13 14:29:15.078158 env[1231]: 2024-12-13 14:29:15.019 [INFO][3759] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4" Dec 13 14:29:15.078158 env[1231]: 2024-12-13 14:29:15.019 [INFO][3759] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4" Dec 13 14:29:15.078158 env[1231]: 2024-12-13 14:29:15.066 [INFO][3766] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4" HandleID="k8s-pod-network.1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4" Workload="localhost-k8s-coredns--76f75df574--mxrls-eth0" Dec 13 14:29:15.078158 env[1231]: 2024-12-13 14:29:15.066 [INFO][3766] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:29:15.078158 env[1231]: 2024-12-13 14:29:15.066 [INFO][3766] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:29:15.078158 env[1231]: 2024-12-13 14:29:15.073 [WARNING][3766] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4" HandleID="k8s-pod-network.1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4" Workload="localhost-k8s-coredns--76f75df574--mxrls-eth0" Dec 13 14:29:15.078158 env[1231]: 2024-12-13 14:29:15.073 [INFO][3766] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4" HandleID="k8s-pod-network.1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4" Workload="localhost-k8s-coredns--76f75df574--mxrls-eth0" Dec 13 14:29:15.078158 env[1231]: 2024-12-13 14:29:15.074 [INFO][3766] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:29:15.078158 env[1231]: 2024-12-13 14:29:15.076 [INFO][3759] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4" Dec 13 14:29:15.079199 env[1231]: time="2024-12-13T14:29:15.078338753Z" level=info msg="TearDown network for sandbox \"1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4\" successfully" Dec 13 14:29:15.079199 env[1231]: time="2024-12-13T14:29:15.078378700Z" level=info msg="StopPodSandbox for \"1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4\" returns successfully" Dec 13 14:29:15.079291 kubelet[2075]: E1213 14:29:15.078754 2075 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:29:15.079953 env[1231]: time="2024-12-13T14:29:15.079921863Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-mxrls,Uid:be7aad04-b593-4297-97e8-844aa1f8a505,Namespace:kube-system,Attempt:1,}" Dec 13 14:29:15.080756 systemd[1]: run-netns-cni\x2defb8f6f0\x2dec43\x2d5421\x2de1de\x2d93515c8622d8.mount: Deactivated successfully. Dec 13 14:29:15.214449 systemd-networkd[1047]: cali92006879359: Link UP Dec 13 14:29:15.216117 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali92006879359: link becomes ready Dec 13 14:29:15.216268 systemd-networkd[1047]: cali92006879359: Gained carrier Dec 13 14:29:15.234366 env[1231]: 2024-12-13 14:29:15.131 [INFO][3773] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--76f75df574--mxrls-eth0 coredns-76f75df574- kube-system be7aad04-b593-4297-97e8-844aa1f8a505 961 0 2024-12-13 14:28:30 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-76f75df574-mxrls eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali92006879359 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="3f3d4b155c246e6e8c171122653fe232595a01eda99672aef2f1ce640a2098d5" Namespace="kube-system" Pod="coredns-76f75df574-mxrls" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--mxrls-" Dec 13 14:29:15.234366 env[1231]: 2024-12-13 14:29:15.131 [INFO][3773] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="3f3d4b155c246e6e8c171122653fe232595a01eda99672aef2f1ce640a2098d5" Namespace="kube-system" Pod="coredns-76f75df574-mxrls" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--mxrls-eth0" Dec 13 14:29:15.234366 env[1231]: 2024-12-13 14:29:15.162 [INFO][3787] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3f3d4b155c246e6e8c171122653fe232595a01eda99672aef2f1ce640a2098d5" HandleID="k8s-pod-network.3f3d4b155c246e6e8c171122653fe232595a01eda99672aef2f1ce640a2098d5" Workload="localhost-k8s-coredns--76f75df574--mxrls-eth0" Dec 13 14:29:15.234366 env[1231]: 2024-12-13 14:29:15.174 [INFO][3787] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="3f3d4b155c246e6e8c171122653fe232595a01eda99672aef2f1ce640a2098d5" HandleID="k8s-pod-network.3f3d4b155c246e6e8c171122653fe232595a01eda99672aef2f1ce640a2098d5" Workload="localhost-k8s-coredns--76f75df574--mxrls-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000404e30), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-76f75df574-mxrls", "timestamp":"2024-12-13 14:29:15.16290418 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:29:15.234366 env[1231]: 2024-12-13 14:29:15.174 [INFO][3787] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:29:15.234366 env[1231]: 2024-12-13 14:29:15.174 [INFO][3787] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:29:15.234366 env[1231]: 2024-12-13 14:29:15.174 [INFO][3787] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 14:29:15.234366 env[1231]: 2024-12-13 14:29:15.176 [INFO][3787] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3f3d4b155c246e6e8c171122653fe232595a01eda99672aef2f1ce640a2098d5" host="localhost" Dec 13 14:29:15.234366 env[1231]: 2024-12-13 14:29:15.179 [INFO][3787] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 14:29:15.234366 env[1231]: 2024-12-13 14:29:15.183 [INFO][3787] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 14:29:15.234366 env[1231]: 2024-12-13 14:29:15.184 [INFO][3787] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 14:29:15.234366 env[1231]: 2024-12-13 14:29:15.186 [INFO][3787] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 14:29:15.234366 env[1231]: 2024-12-13 14:29:15.186 [INFO][3787] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.3f3d4b155c246e6e8c171122653fe232595a01eda99672aef2f1ce640a2098d5" host="localhost" Dec 13 14:29:15.234366 env[1231]: 2024-12-13 14:29:15.188 [INFO][3787] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.3f3d4b155c246e6e8c171122653fe232595a01eda99672aef2f1ce640a2098d5 Dec 13 14:29:15.234366 env[1231]: 2024-12-13 14:29:15.199 [INFO][3787] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.3f3d4b155c246e6e8c171122653fe232595a01eda99672aef2f1ce640a2098d5" host="localhost" Dec 13 14:29:15.234366 env[1231]: 2024-12-13 14:29:15.208 [INFO][3787] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.3f3d4b155c246e6e8c171122653fe232595a01eda99672aef2f1ce640a2098d5" host="localhost" Dec 13 14:29:15.234366 env[1231]: 2024-12-13 14:29:15.208 [INFO][3787] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.3f3d4b155c246e6e8c171122653fe232595a01eda99672aef2f1ce640a2098d5" host="localhost" Dec 13 14:29:15.234366 env[1231]: 2024-12-13 14:29:15.208 [INFO][3787] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:29:15.234366 env[1231]: 2024-12-13 14:29:15.208 [INFO][3787] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="3f3d4b155c246e6e8c171122653fe232595a01eda99672aef2f1ce640a2098d5" HandleID="k8s-pod-network.3f3d4b155c246e6e8c171122653fe232595a01eda99672aef2f1ce640a2098d5" Workload="localhost-k8s-coredns--76f75df574--mxrls-eth0" Dec 13 14:29:15.235243 env[1231]: 2024-12-13 14:29:15.211 [INFO][3773] cni-plugin/k8s.go 386: Populated endpoint ContainerID="3f3d4b155c246e6e8c171122653fe232595a01eda99672aef2f1ce640a2098d5" Namespace="kube-system" Pod="coredns-76f75df574-mxrls" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--mxrls-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--mxrls-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"be7aad04-b593-4297-97e8-844aa1f8a505", ResourceVersion:"961", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 28, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-76f75df574-mxrls", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali92006879359", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:29:15.235243 env[1231]: 2024-12-13 14:29:15.211 [INFO][3773] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="3f3d4b155c246e6e8c171122653fe232595a01eda99672aef2f1ce640a2098d5" Namespace="kube-system" Pod="coredns-76f75df574-mxrls" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--mxrls-eth0" Dec 13 14:29:15.235243 env[1231]: 2024-12-13 14:29:15.211 [INFO][3773] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali92006879359 ContainerID="3f3d4b155c246e6e8c171122653fe232595a01eda99672aef2f1ce640a2098d5" Namespace="kube-system" Pod="coredns-76f75df574-mxrls" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--mxrls-eth0" Dec 13 14:29:15.235243 env[1231]: 2024-12-13 14:29:15.216 [INFO][3773] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="3f3d4b155c246e6e8c171122653fe232595a01eda99672aef2f1ce640a2098d5" Namespace="kube-system" Pod="coredns-76f75df574-mxrls" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--mxrls-eth0" Dec 13 14:29:15.235243 env[1231]: 2024-12-13 14:29:15.217 [INFO][3773] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="3f3d4b155c246e6e8c171122653fe232595a01eda99672aef2f1ce640a2098d5" Namespace="kube-system" Pod="coredns-76f75df574-mxrls" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--mxrls-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--mxrls-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"be7aad04-b593-4297-97e8-844aa1f8a505", ResourceVersion:"961", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 28, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"3f3d4b155c246e6e8c171122653fe232595a01eda99672aef2f1ce640a2098d5", Pod:"coredns-76f75df574-mxrls", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali92006879359", MAC:"fe:ba:af:9c:63:51", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:29:15.235243 env[1231]: 2024-12-13 14:29:15.231 [INFO][3773] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="3f3d4b155c246e6e8c171122653fe232595a01eda99672aef2f1ce640a2098d5" Namespace="kube-system" Pod="coredns-76f75df574-mxrls" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--mxrls-eth0" Dec 13 14:29:15.240000 audit[3803]: NETFILTER_CFG table=filter:101 family=2 entries=34 op=nft_register_chain pid=3803 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:29:15.240000 audit[3803]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffd6b8e9190 a2=0 a3=7ffd6b8e917c items=0 ppid=3550 pid=3803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:15.240000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:29:15.249032 env[1231]: time="2024-12-13T14:29:15.248934037Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:29:15.249032 env[1231]: time="2024-12-13T14:29:15.248979004Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:29:15.249032 env[1231]: time="2024-12-13T14:29:15.249001618Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:29:15.249334 env[1231]: time="2024-12-13T14:29:15.249204209Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3f3d4b155c246e6e8c171122653fe232595a01eda99672aef2f1ce640a2098d5 pid=3815 runtime=io.containerd.runc.v2 Dec 13 14:29:15.264840 systemd[1]: Started cri-containerd-3f3d4b155c246e6e8c171122653fe232595a01eda99672aef2f1ce640a2098d5.scope. Dec 13 14:29:15.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.275000 audit: BPF prog-id=158 op=LOAD Dec 13 14:29:15.276000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.276000 audit[3825]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3815 pid=3825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:15.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366336434623135356332343665366538633137313132323635336665 Dec 13 14:29:15.276000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.276000 audit[3825]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3815 pid=3825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:15.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366336434623135356332343665366538633137313132323635336665 Dec 13 14:29:15.276000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.276000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.276000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.276000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.276000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.276000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.276000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.276000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.276000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.276000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.276000 audit: BPF prog-id=159 op=LOAD Dec 13 14:29:15.276000 audit[3825]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000219950 items=0 ppid=3815 pid=3825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:15.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366336434623135356332343665366538633137313132323635336665 Dec 13 14:29:15.276000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.276000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.276000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.276000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.276000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.276000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.276000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.276000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.276000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.276000 audit: BPF prog-id=160 op=LOAD Dec 13 14:29:15.276000 audit[3825]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000219998 items=0 ppid=3815 pid=3825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:15.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366336434623135356332343665366538633137313132323635336665 Dec 13 14:29:15.276000 audit: BPF prog-id=160 op=UNLOAD Dec 13 14:29:15.276000 audit: BPF prog-id=159 op=UNLOAD Dec 13 14:29:15.276000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.276000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.276000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.276000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.276000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.276000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.276000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.276000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.276000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.276000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.276000 audit: BPF prog-id=161 op=LOAD Dec 13 14:29:15.276000 audit[3825]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000219da8 items=0 ppid=3815 pid=3825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:15.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366336434623135356332343665366538633137313132323635336665 Dec 13 14:29:15.278775 systemd-resolved[1167]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:29:15.301349 env[1231]: time="2024-12-13T14:29:15.301284118Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-mxrls,Uid:be7aad04-b593-4297-97e8-844aa1f8a505,Namespace:kube-system,Attempt:1,} returns sandbox id \"3f3d4b155c246e6e8c171122653fe232595a01eda99672aef2f1ce640a2098d5\"" Dec 13 14:29:15.302230 kubelet[2075]: E1213 14:29:15.302144 2075 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:29:15.305010 env[1231]: time="2024-12-13T14:29:15.304965804Z" level=info msg="CreateContainer within sandbox \"3f3d4b155c246e6e8c171122653fe232595a01eda99672aef2f1ce640a2098d5\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 14:29:15.334508 env[1231]: time="2024-12-13T14:29:15.334431224Z" level=info msg="CreateContainer within sandbox \"3f3d4b155c246e6e8c171122653fe232595a01eda99672aef2f1ce640a2098d5\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"c406e8557f4d829df3c8f6e06a5146c0cc0f41b46bcbab4c73b97e26188d7af7\"" Dec 13 14:29:15.335148 env[1231]: time="2024-12-13T14:29:15.335108343Z" level=info msg="StartContainer for \"c406e8557f4d829df3c8f6e06a5146c0cc0f41b46bcbab4c73b97e26188d7af7\"" Dec 13 14:29:15.358338 systemd[1]: Started cri-containerd-c406e8557f4d829df3c8f6e06a5146c0cc0f41b46bcbab4c73b97e26188d7af7.scope. Dec 13 14:29:15.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.377000 audit: BPF prog-id=162 op=LOAD Dec 13 14:29:15.377000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.377000 audit[3857]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3815 pid=3857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:15.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334303665383535376634643832396466336338663665303661353134 Dec 13 14:29:15.377000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.377000 audit[3857]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3815 pid=3857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:15.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334303665383535376634643832396466336338663665303661353134 Dec 13 14:29:15.377000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.377000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.377000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.377000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.377000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.377000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.377000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.377000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.377000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.377000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.377000 audit: BPF prog-id=163 op=LOAD Dec 13 14:29:15.377000 audit[3857]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002e61b0 items=0 ppid=3815 pid=3857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:15.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334303665383535376634643832396466336338663665303661353134 Dec 13 14:29:15.378000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.378000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.378000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.378000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.378000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.378000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.378000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.378000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.378000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.378000 audit: BPF prog-id=164 op=LOAD Dec 13 14:29:15.378000 audit[3857]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002e61f8 items=0 ppid=3815 pid=3857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:15.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334303665383535376634643832396466336338663665303661353134 Dec 13 14:29:15.378000 audit: BPF prog-id=164 op=UNLOAD Dec 13 14:29:15.378000 audit: BPF prog-id=163 op=UNLOAD Dec 13 14:29:15.378000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.378000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.378000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.378000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.378000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.378000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.378000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.378000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.378000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.378000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:15.378000 audit: BPF prog-id=165 op=LOAD Dec 13 14:29:15.378000 audit[3857]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002e6608 items=0 ppid=3815 pid=3857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:15.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334303665383535376634643832396466336338663665303661353134 Dec 13 14:29:15.395549 env[1231]: time="2024-12-13T14:29:15.395490098Z" level=info msg="StartContainer for \"c406e8557f4d829df3c8f6e06a5146c0cc0f41b46bcbab4c73b97e26188d7af7\" returns successfully" Dec 13 14:29:16.043284 kubelet[2075]: E1213 14:29:16.043247 2075 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:29:16.064420 kubelet[2075]: I1213 14:29:16.063875 2075 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-mxrls" podStartSLOduration=46.063820766 podStartE2EDuration="46.063820766s" podCreationTimestamp="2024-12-13 14:28:30 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:29:16.054808242 +0000 UTC m=+59.243543597" watchObservedRunningTime="2024-12-13 14:29:16.063820766 +0000 UTC m=+59.252556111" Dec 13 14:29:16.070000 audit[3895]: NETFILTER_CFG table=filter:102 family=2 entries=16 op=nft_register_rule pid=3895 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:16.070000 audit[3895]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffce329e470 a2=0 a3=7ffce329e45c items=0 ppid=2274 pid=3895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:16.070000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:29:16.076000 audit[3895]: NETFILTER_CFG table=nat:103 family=2 entries=14 op=nft_register_rule pid=3895 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:16.076000 audit[3895]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffce329e470 a2=0 a3=0 items=0 ppid=2274 pid=3895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:16.076000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:29:16.092000 audit[3897]: NETFILTER_CFG table=filter:104 family=2 entries=13 op=nft_register_rule pid=3897 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:16.092000 audit[3897]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fffc4e7b2a0 a2=0 a3=7fffc4e7b28c items=0 ppid=2274 pid=3897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:16.092000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:29:16.096000 audit[3897]: NETFILTER_CFG table=nat:105 family=2 entries=35 op=nft_register_chain pid=3897 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:16.096000 audit[3897]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7fffc4e7b2a0 a2=0 a3=7fffc4e7b28c items=0 ppid=2274 pid=3897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:16.096000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:29:16.125237 systemd-networkd[1047]: vxlan.calico: Gained IPv6LL Dec 13 14:29:16.508261 systemd-networkd[1047]: cali92006879359: Gained IPv6LL Dec 13 14:29:16.887211 env[1231]: time="2024-12-13T14:29:16.887160463Z" level=info msg="StopPodSandbox for \"1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4\"" Dec 13 14:29:16.984906 env[1231]: 2024-12-13 14:29:16.943 [WARNING][3917] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--mxrls-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"be7aad04-b593-4297-97e8-844aa1f8a505", ResourceVersion:"988", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 28, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"3f3d4b155c246e6e8c171122653fe232595a01eda99672aef2f1ce640a2098d5", Pod:"coredns-76f75df574-mxrls", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali92006879359", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:29:16.984906 env[1231]: 2024-12-13 14:29:16.943 [INFO][3917] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4" Dec 13 14:29:16.984906 env[1231]: 2024-12-13 14:29:16.944 [INFO][3917] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4" iface="eth0" netns="" Dec 13 14:29:16.984906 env[1231]: 2024-12-13 14:29:16.944 [INFO][3917] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4" Dec 13 14:29:16.984906 env[1231]: 2024-12-13 14:29:16.944 [INFO][3917] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4" Dec 13 14:29:16.984906 env[1231]: 2024-12-13 14:29:16.963 [INFO][3927] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4" HandleID="k8s-pod-network.1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4" Workload="localhost-k8s-coredns--76f75df574--mxrls-eth0" Dec 13 14:29:16.984906 env[1231]: 2024-12-13 14:29:16.963 [INFO][3927] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:29:16.984906 env[1231]: 2024-12-13 14:29:16.963 [INFO][3927] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:29:16.984906 env[1231]: 2024-12-13 14:29:16.979 [WARNING][3927] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4" HandleID="k8s-pod-network.1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4" Workload="localhost-k8s-coredns--76f75df574--mxrls-eth0" Dec 13 14:29:16.984906 env[1231]: 2024-12-13 14:29:16.979 [INFO][3927] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4" HandleID="k8s-pod-network.1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4" Workload="localhost-k8s-coredns--76f75df574--mxrls-eth0" Dec 13 14:29:16.984906 env[1231]: 2024-12-13 14:29:16.981 [INFO][3927] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:29:16.984906 env[1231]: 2024-12-13 14:29:16.983 [INFO][3917] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4" Dec 13 14:29:16.985571 env[1231]: time="2024-12-13T14:29:16.984944759Z" level=info msg="TearDown network for sandbox \"1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4\" successfully" Dec 13 14:29:16.985571 env[1231]: time="2024-12-13T14:29:16.984985588Z" level=info msg="StopPodSandbox for \"1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4\" returns successfully" Dec 13 14:29:16.985644 env[1231]: time="2024-12-13T14:29:16.985615335Z" level=info msg="RemovePodSandbox for \"1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4\"" Dec 13 14:29:16.985697 env[1231]: time="2024-12-13T14:29:16.985649661Z" level=info msg="Forcibly stopping sandbox \"1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4\"" Dec 13 14:29:17.044540 kubelet[2075]: E1213 14:29:17.044501 2075 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:29:17.072665 env[1231]: 2024-12-13 14:29:17.029 [WARNING][3949] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--mxrls-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"be7aad04-b593-4297-97e8-844aa1f8a505", ResourceVersion:"988", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 28, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"3f3d4b155c246e6e8c171122653fe232595a01eda99672aef2f1ce640a2098d5", Pod:"coredns-76f75df574-mxrls", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali92006879359", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:29:17.072665 env[1231]: 2024-12-13 14:29:17.029 [INFO][3949] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4" Dec 13 14:29:17.072665 env[1231]: 2024-12-13 14:29:17.029 [INFO][3949] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4" iface="eth0" netns="" Dec 13 14:29:17.072665 env[1231]: 2024-12-13 14:29:17.029 [INFO][3949] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4" Dec 13 14:29:17.072665 env[1231]: 2024-12-13 14:29:17.029 [INFO][3949] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4" Dec 13 14:29:17.072665 env[1231]: 2024-12-13 14:29:17.058 [INFO][3956] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4" HandleID="k8s-pod-network.1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4" Workload="localhost-k8s-coredns--76f75df574--mxrls-eth0" Dec 13 14:29:17.072665 env[1231]: 2024-12-13 14:29:17.058 [INFO][3956] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:29:17.072665 env[1231]: 2024-12-13 14:29:17.058 [INFO][3956] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:29:17.072665 env[1231]: 2024-12-13 14:29:17.067 [WARNING][3956] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4" HandleID="k8s-pod-network.1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4" Workload="localhost-k8s-coredns--76f75df574--mxrls-eth0" Dec 13 14:29:17.072665 env[1231]: 2024-12-13 14:29:17.067 [INFO][3956] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4" HandleID="k8s-pod-network.1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4" Workload="localhost-k8s-coredns--76f75df574--mxrls-eth0" Dec 13 14:29:17.072665 env[1231]: 2024-12-13 14:29:17.069 [INFO][3956] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:29:17.072665 env[1231]: 2024-12-13 14:29:17.071 [INFO][3949] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4" Dec 13 14:29:17.073241 env[1231]: time="2024-12-13T14:29:17.072700121Z" level=info msg="TearDown network for sandbox \"1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4\" successfully" Dec 13 14:29:17.138179 env[1231]: time="2024-12-13T14:29:17.138053220Z" level=info msg="RemovePodSandbox \"1aff826fc3de74999ae742c181821ce0d4039ddc13b2c08021b28862f9517be4\" returns successfully" Dec 13 14:29:18.047687 kubelet[2075]: E1213 14:29:18.047651 2075 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:29:19.897915 systemd[1]: Started sshd@15-10.0.0.112:22-10.0.0.1:37478.service. Dec 13 14:29:19.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.112:22-10.0.0.1:37478 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:19.900123 kernel: kauditd_printk_skb: 645 callbacks suppressed Dec 13 14:29:19.900290 kernel: audit: type=1130 audit(1734100159.896:1222): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.112:22-10.0.0.1:37478 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:19.933000 audit[3970]: USER_ACCT pid=3970 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:19.934420 sshd[3970]: Accepted publickey for core from 10.0.0.1 port 37478 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:29:19.937000 audit[3970]: CRED_ACQ pid=3970 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:19.939120 sshd[3970]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:29:19.943132 kernel: audit: type=1101 audit(1734100159.933:1223): pid=3970 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:19.943282 kernel: audit: type=1103 audit(1734100159.937:1224): pid=3970 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:19.943322 kernel: audit: type=1006 audit(1734100159.937:1225): pid=3970 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Dec 13 14:29:19.943610 systemd-logind[1219]: New session 16 of user core. Dec 13 14:29:19.944793 systemd[1]: Started session-16.scope. Dec 13 14:29:19.946247 kernel: audit: type=1300 audit(1734100159.937:1225): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffac8ab990 a2=3 a3=0 items=0 ppid=1 pid=3970 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:19.937000 audit[3970]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffac8ab990 a2=3 a3=0 items=0 ppid=1 pid=3970 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:19.937000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:29:19.952757 kernel: audit: type=1327 audit(1734100159.937:1225): proctitle=737368643A20636F7265205B707269765D Dec 13 14:29:19.952814 kernel: audit: type=1105 audit(1734100159.948:1226): pid=3970 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:19.948000 audit[3970]: USER_START pid=3970 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:19.950000 audit[3972]: CRED_ACQ pid=3972 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:19.960742 kernel: audit: type=1103 audit(1734100159.950:1227): pid=3972 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:20.057536 sshd[3970]: pam_unix(sshd:session): session closed for user core Dec 13 14:29:20.057000 audit[3970]: USER_END pid=3970 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:20.060124 systemd[1]: sshd@15-10.0.0.112:22-10.0.0.1:37478.service: Deactivated successfully. Dec 13 14:29:20.060905 systemd[1]: session-16.scope: Deactivated successfully. Dec 13 14:29:20.061969 systemd-logind[1219]: Session 16 logged out. Waiting for processes to exit. Dec 13 14:29:20.062772 systemd-logind[1219]: Removed session 16. Dec 13 14:29:20.057000 audit[3970]: CRED_DISP pid=3970 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:20.067452 kernel: audit: type=1106 audit(1734100160.057:1228): pid=3970 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:20.067522 kernel: audit: type=1104 audit(1734100160.057:1229): pid=3970 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:20.057000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.112:22-10.0.0.1:37478 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:22.902351 env[1231]: time="2024-12-13T14:29:22.902273696Z" level=info msg="StopPodSandbox for \"3365bcbfb0c17dc5eb8337e4c1f6c2b8025fbd68da45bd7a93c55d755ee1543c\"" Dec 13 14:29:22.977823 env[1231]: 2024-12-13 14:29:22.947 [INFO][4001] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3365bcbfb0c17dc5eb8337e4c1f6c2b8025fbd68da45bd7a93c55d755ee1543c" Dec 13 14:29:22.977823 env[1231]: 2024-12-13 14:29:22.947 [INFO][4001] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="3365bcbfb0c17dc5eb8337e4c1f6c2b8025fbd68da45bd7a93c55d755ee1543c" iface="eth0" netns="/var/run/netns/cni-ab702584-8434-fe76-fd7e-856fd3687e99" Dec 13 14:29:22.977823 env[1231]: 2024-12-13 14:29:22.947 [INFO][4001] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="3365bcbfb0c17dc5eb8337e4c1f6c2b8025fbd68da45bd7a93c55d755ee1543c" iface="eth0" netns="/var/run/netns/cni-ab702584-8434-fe76-fd7e-856fd3687e99" Dec 13 14:29:22.977823 env[1231]: 2024-12-13 14:29:22.947 [INFO][4001] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="3365bcbfb0c17dc5eb8337e4c1f6c2b8025fbd68da45bd7a93c55d755ee1543c" iface="eth0" netns="/var/run/netns/cni-ab702584-8434-fe76-fd7e-856fd3687e99" Dec 13 14:29:22.977823 env[1231]: 2024-12-13 14:29:22.948 [INFO][4001] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3365bcbfb0c17dc5eb8337e4c1f6c2b8025fbd68da45bd7a93c55d755ee1543c" Dec 13 14:29:22.977823 env[1231]: 2024-12-13 14:29:22.948 [INFO][4001] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3365bcbfb0c17dc5eb8337e4c1f6c2b8025fbd68da45bd7a93c55d755ee1543c" Dec 13 14:29:22.977823 env[1231]: 2024-12-13 14:29:22.967 [INFO][4008] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3365bcbfb0c17dc5eb8337e4c1f6c2b8025fbd68da45bd7a93c55d755ee1543c" HandleID="k8s-pod-network.3365bcbfb0c17dc5eb8337e4c1f6c2b8025fbd68da45bd7a93c55d755ee1543c" Workload="localhost-k8s-calico--apiserver--6fdbbd74b4--qmlf8-eth0" Dec 13 14:29:22.977823 env[1231]: 2024-12-13 14:29:22.967 [INFO][4008] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:29:22.977823 env[1231]: 2024-12-13 14:29:22.967 [INFO][4008] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:29:22.977823 env[1231]: 2024-12-13 14:29:22.973 [WARNING][4008] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3365bcbfb0c17dc5eb8337e4c1f6c2b8025fbd68da45bd7a93c55d755ee1543c" HandleID="k8s-pod-network.3365bcbfb0c17dc5eb8337e4c1f6c2b8025fbd68da45bd7a93c55d755ee1543c" Workload="localhost-k8s-calico--apiserver--6fdbbd74b4--qmlf8-eth0" Dec 13 14:29:22.977823 env[1231]: 2024-12-13 14:29:22.973 [INFO][4008] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3365bcbfb0c17dc5eb8337e4c1f6c2b8025fbd68da45bd7a93c55d755ee1543c" HandleID="k8s-pod-network.3365bcbfb0c17dc5eb8337e4c1f6c2b8025fbd68da45bd7a93c55d755ee1543c" Workload="localhost-k8s-calico--apiserver--6fdbbd74b4--qmlf8-eth0" Dec 13 14:29:22.977823 env[1231]: 2024-12-13 14:29:22.974 [INFO][4008] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:29:22.977823 env[1231]: 2024-12-13 14:29:22.975 [INFO][4001] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3365bcbfb0c17dc5eb8337e4c1f6c2b8025fbd68da45bd7a93c55d755ee1543c" Dec 13 14:29:22.978645 env[1231]: time="2024-12-13T14:29:22.978020778Z" level=info msg="TearDown network for sandbox \"3365bcbfb0c17dc5eb8337e4c1f6c2b8025fbd68da45bd7a93c55d755ee1543c\" successfully" Dec 13 14:29:22.978645 env[1231]: time="2024-12-13T14:29:22.978061725Z" level=info msg="StopPodSandbox for \"3365bcbfb0c17dc5eb8337e4c1f6c2b8025fbd68da45bd7a93c55d755ee1543c\" returns successfully" Dec 13 14:29:22.978983 env[1231]: time="2024-12-13T14:29:22.978947410Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6fdbbd74b4-qmlf8,Uid:77b0e9b3-1aa6-45f0-8681-3e913425307b,Namespace:calico-apiserver,Attempt:1,}" Dec 13 14:29:22.980569 systemd[1]: run-netns-cni\x2dab702584\x2d8434\x2dfe76\x2dfd7e\x2d856fd3687e99.mount: Deactivated successfully. Dec 13 14:29:23.093478 systemd-networkd[1047]: cali9a678805ec5: Link UP Dec 13 14:29:23.095910 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:29:23.095990 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9a678805ec5: link becomes ready Dec 13 14:29:23.096223 systemd-networkd[1047]: cali9a678805ec5: Gained carrier Dec 13 14:29:23.111210 env[1231]: 2024-12-13 14:29:23.033 [INFO][4017] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--6fdbbd74b4--qmlf8-eth0 calico-apiserver-6fdbbd74b4- calico-apiserver 77b0e9b3-1aa6-45f0-8681-3e913425307b 1020 0 2024-12-13 14:28:38 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6fdbbd74b4 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-6fdbbd74b4-qmlf8 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali9a678805ec5 [] []}} ContainerID="ec7e367cc720a1ebaf1cb23a380164ad3004cebed3666bd73c882b9e3c378e63" Namespace="calico-apiserver" Pod="calico-apiserver-6fdbbd74b4-qmlf8" WorkloadEndpoint="localhost-k8s-calico--apiserver--6fdbbd74b4--qmlf8-" Dec 13 14:29:23.111210 env[1231]: 2024-12-13 14:29:23.033 [INFO][4017] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="ec7e367cc720a1ebaf1cb23a380164ad3004cebed3666bd73c882b9e3c378e63" Namespace="calico-apiserver" Pod="calico-apiserver-6fdbbd74b4-qmlf8" WorkloadEndpoint="localhost-k8s-calico--apiserver--6fdbbd74b4--qmlf8-eth0" Dec 13 14:29:23.111210 env[1231]: 2024-12-13 14:29:23.060 [INFO][4030] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ec7e367cc720a1ebaf1cb23a380164ad3004cebed3666bd73c882b9e3c378e63" HandleID="k8s-pod-network.ec7e367cc720a1ebaf1cb23a380164ad3004cebed3666bd73c882b9e3c378e63" Workload="localhost-k8s-calico--apiserver--6fdbbd74b4--qmlf8-eth0" Dec 13 14:29:23.111210 env[1231]: 2024-12-13 14:29:23.068 [INFO][4030] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ec7e367cc720a1ebaf1cb23a380164ad3004cebed3666bd73c882b9e3c378e63" HandleID="k8s-pod-network.ec7e367cc720a1ebaf1cb23a380164ad3004cebed3666bd73c882b9e3c378e63" Workload="localhost-k8s-calico--apiserver--6fdbbd74b4--qmlf8-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000294140), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-6fdbbd74b4-qmlf8", "timestamp":"2024-12-13 14:29:23.060920832 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:29:23.111210 env[1231]: 2024-12-13 14:29:23.068 [INFO][4030] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:29:23.111210 env[1231]: 2024-12-13 14:29:23.068 [INFO][4030] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:29:23.111210 env[1231]: 2024-12-13 14:29:23.068 [INFO][4030] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 14:29:23.111210 env[1231]: 2024-12-13 14:29:23.069 [INFO][4030] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ec7e367cc720a1ebaf1cb23a380164ad3004cebed3666bd73c882b9e3c378e63" host="localhost" Dec 13 14:29:23.111210 env[1231]: 2024-12-13 14:29:23.072 [INFO][4030] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 14:29:23.111210 env[1231]: 2024-12-13 14:29:23.075 [INFO][4030] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 14:29:23.111210 env[1231]: 2024-12-13 14:29:23.076 [INFO][4030] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 14:29:23.111210 env[1231]: 2024-12-13 14:29:23.078 [INFO][4030] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 14:29:23.111210 env[1231]: 2024-12-13 14:29:23.078 [INFO][4030] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.ec7e367cc720a1ebaf1cb23a380164ad3004cebed3666bd73c882b9e3c378e63" host="localhost" Dec 13 14:29:23.111210 env[1231]: 2024-12-13 14:29:23.080 [INFO][4030] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.ec7e367cc720a1ebaf1cb23a380164ad3004cebed3666bd73c882b9e3c378e63 Dec 13 14:29:23.111210 env[1231]: 2024-12-13 14:29:23.083 [INFO][4030] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.ec7e367cc720a1ebaf1cb23a380164ad3004cebed3666bd73c882b9e3c378e63" host="localhost" Dec 13 14:29:23.111210 env[1231]: 2024-12-13 14:29:23.089 [INFO][4030] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.ec7e367cc720a1ebaf1cb23a380164ad3004cebed3666bd73c882b9e3c378e63" host="localhost" Dec 13 14:29:23.111210 env[1231]: 2024-12-13 14:29:23.089 [INFO][4030] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.ec7e367cc720a1ebaf1cb23a380164ad3004cebed3666bd73c882b9e3c378e63" host="localhost" Dec 13 14:29:23.111210 env[1231]: 2024-12-13 14:29:23.089 [INFO][4030] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:29:23.111210 env[1231]: 2024-12-13 14:29:23.089 [INFO][4030] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="ec7e367cc720a1ebaf1cb23a380164ad3004cebed3666bd73c882b9e3c378e63" HandleID="k8s-pod-network.ec7e367cc720a1ebaf1cb23a380164ad3004cebed3666bd73c882b9e3c378e63" Workload="localhost-k8s-calico--apiserver--6fdbbd74b4--qmlf8-eth0" Dec 13 14:29:23.112056 env[1231]: 2024-12-13 14:29:23.091 [INFO][4017] cni-plugin/k8s.go 386: Populated endpoint ContainerID="ec7e367cc720a1ebaf1cb23a380164ad3004cebed3666bd73c882b9e3c378e63" Namespace="calico-apiserver" Pod="calico-apiserver-6fdbbd74b4-qmlf8" WorkloadEndpoint="localhost-k8s-calico--apiserver--6fdbbd74b4--qmlf8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6fdbbd74b4--qmlf8-eth0", GenerateName:"calico-apiserver-6fdbbd74b4-", Namespace:"calico-apiserver", SelfLink:"", UID:"77b0e9b3-1aa6-45f0-8681-3e913425307b", ResourceVersion:"1020", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 28, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6fdbbd74b4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-6fdbbd74b4-qmlf8", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali9a678805ec5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:29:23.112056 env[1231]: 2024-12-13 14:29:23.092 [INFO][4017] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="ec7e367cc720a1ebaf1cb23a380164ad3004cebed3666bd73c882b9e3c378e63" Namespace="calico-apiserver" Pod="calico-apiserver-6fdbbd74b4-qmlf8" WorkloadEndpoint="localhost-k8s-calico--apiserver--6fdbbd74b4--qmlf8-eth0" Dec 13 14:29:23.112056 env[1231]: 2024-12-13 14:29:23.092 [INFO][4017] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali9a678805ec5 ContainerID="ec7e367cc720a1ebaf1cb23a380164ad3004cebed3666bd73c882b9e3c378e63" Namespace="calico-apiserver" Pod="calico-apiserver-6fdbbd74b4-qmlf8" WorkloadEndpoint="localhost-k8s-calico--apiserver--6fdbbd74b4--qmlf8-eth0" Dec 13 14:29:23.112056 env[1231]: 2024-12-13 14:29:23.096 [INFO][4017] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ec7e367cc720a1ebaf1cb23a380164ad3004cebed3666bd73c882b9e3c378e63" Namespace="calico-apiserver" Pod="calico-apiserver-6fdbbd74b4-qmlf8" WorkloadEndpoint="localhost-k8s-calico--apiserver--6fdbbd74b4--qmlf8-eth0" Dec 13 14:29:23.112056 env[1231]: 2024-12-13 14:29:23.096 [INFO][4017] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="ec7e367cc720a1ebaf1cb23a380164ad3004cebed3666bd73c882b9e3c378e63" Namespace="calico-apiserver" Pod="calico-apiserver-6fdbbd74b4-qmlf8" WorkloadEndpoint="localhost-k8s-calico--apiserver--6fdbbd74b4--qmlf8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6fdbbd74b4--qmlf8-eth0", GenerateName:"calico-apiserver-6fdbbd74b4-", Namespace:"calico-apiserver", SelfLink:"", UID:"77b0e9b3-1aa6-45f0-8681-3e913425307b", ResourceVersion:"1020", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 28, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6fdbbd74b4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"ec7e367cc720a1ebaf1cb23a380164ad3004cebed3666bd73c882b9e3c378e63", Pod:"calico-apiserver-6fdbbd74b4-qmlf8", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali9a678805ec5", MAC:"06:e8:9f:49:9c:df", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:29:23.112056 env[1231]: 2024-12-13 14:29:23.108 [INFO][4017] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="ec7e367cc720a1ebaf1cb23a380164ad3004cebed3666bd73c882b9e3c378e63" Namespace="calico-apiserver" Pod="calico-apiserver-6fdbbd74b4-qmlf8" WorkloadEndpoint="localhost-k8s-calico--apiserver--6fdbbd74b4--qmlf8-eth0" Dec 13 14:29:23.118000 audit[4055]: NETFILTER_CFG table=filter:106 family=2 entries=44 op=nft_register_chain pid=4055 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:29:23.118000 audit[4055]: SYSCALL arch=c000003e syscall=46 success=yes exit=24680 a0=3 a1=7ffeca346090 a2=0 a3=7ffeca34607c items=0 ppid=3550 pid=4055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:23.118000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:29:23.126025 env[1231]: time="2024-12-13T14:29:23.125924863Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:29:23.126025 env[1231]: time="2024-12-13T14:29:23.125993912Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:29:23.126253 env[1231]: time="2024-12-13T14:29:23.126008359Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:29:23.126764 env[1231]: time="2024-12-13T14:29:23.126708128Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ec7e367cc720a1ebaf1cb23a380164ad3004cebed3666bd73c882b9e3c378e63 pid=4064 runtime=io.containerd.runc.v2 Dec 13 14:29:23.147114 systemd[1]: Started cri-containerd-ec7e367cc720a1ebaf1cb23a380164ad3004cebed3666bd73c882b9e3c378e63.scope. Dec 13 14:29:23.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:23.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:23.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:23.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:23.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:23.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:23.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:23.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:23.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:23.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:23.158000 audit: BPF prog-id=166 op=LOAD Dec 13 14:29:23.160000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:23.160000 audit[4074]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4064 pid=4074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:23.160000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563376533363763633732306131656261663163623233613338303136 Dec 13 14:29:23.161000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:23.161000 audit[4074]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4064 pid=4074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:23.161000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563376533363763633732306131656261663163623233613338303136 Dec 13 14:29:23.161000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:23.161000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:23.161000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:23.161000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:23.161000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:23.161000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:23.161000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:23.161000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:23.161000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:23.161000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:23.161000 audit: BPF prog-id=167 op=LOAD Dec 13 14:29:23.161000 audit[4074]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00030a790 items=0 ppid=4064 pid=4074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:23.161000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563376533363763633732306131656261663163623233613338303136 Dec 13 14:29:23.161000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:23.161000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:23.161000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:23.161000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:23.161000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:23.161000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:23.161000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:23.161000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:23.161000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:23.161000 audit: BPF prog-id=168 op=LOAD Dec 13 14:29:23.161000 audit[4074]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00030a7d8 items=0 ppid=4064 pid=4074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:23.161000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563376533363763633732306131656261663163623233613338303136 Dec 13 14:29:23.161000 audit: BPF prog-id=168 op=UNLOAD Dec 13 14:29:23.161000 audit: BPF prog-id=167 op=UNLOAD Dec 13 14:29:23.161000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:23.161000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:23.161000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:23.161000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:23.161000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:23.161000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:23.161000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:23.161000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:23.161000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:23.161000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:23.161000 audit: BPF prog-id=169 op=LOAD Dec 13 14:29:23.161000 audit[4074]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00030abe8 items=0 ppid=4064 pid=4074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:23.161000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563376533363763633732306131656261663163623233613338303136 Dec 13 14:29:23.163288 systemd-resolved[1167]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:29:23.188643 env[1231]: time="2024-12-13T14:29:23.188577295Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6fdbbd74b4-qmlf8,Uid:77b0e9b3-1aa6-45f0-8681-3e913425307b,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"ec7e367cc720a1ebaf1cb23a380164ad3004cebed3666bd73c882b9e3c378e63\"" Dec 13 14:29:23.190587 env[1231]: time="2024-12-13T14:29:23.190546248Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 14:29:23.890313 kubelet[2075]: E1213 14:29:23.890272 2075 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:29:23.980476 systemd[1]: run-containerd-runc-k8s.io-ec7e367cc720a1ebaf1cb23a380164ad3004cebed3666bd73c882b9e3c378e63-runc.w5ehYd.mount: Deactivated successfully. Dec 13 14:29:24.508320 systemd-networkd[1047]: cali9a678805ec5: Gained IPv6LL Dec 13 14:29:24.902268 env[1231]: time="2024-12-13T14:29:24.902210256Z" level=info msg="StopPodSandbox for \"73c809ecb32e20add5ba2387a36fe05c5f2439b3c82355a300a062a4708b6126\"" Dec 13 14:29:24.902655 env[1231]: time="2024-12-13T14:29:24.902232427Z" level=info msg="StopPodSandbox for \"adb123cef83f66509da4f9499cf601ff4f666de1c943daa1f664d8d88fe06643\"" Dec 13 14:29:25.032053 env[1231]: 2024-12-13 14:29:24.972 [INFO][4156] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="adb123cef83f66509da4f9499cf601ff4f666de1c943daa1f664d8d88fe06643" Dec 13 14:29:25.032053 env[1231]: 2024-12-13 14:29:24.972 [INFO][4156] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="adb123cef83f66509da4f9499cf601ff4f666de1c943daa1f664d8d88fe06643" iface="eth0" netns="/var/run/netns/cni-2b0f27a6-9162-411c-4728-f47b3767fddb" Dec 13 14:29:25.032053 env[1231]: 2024-12-13 14:29:24.973 [INFO][4156] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="adb123cef83f66509da4f9499cf601ff4f666de1c943daa1f664d8d88fe06643" iface="eth0" netns="/var/run/netns/cni-2b0f27a6-9162-411c-4728-f47b3767fddb" Dec 13 14:29:25.032053 env[1231]: 2024-12-13 14:29:24.973 [INFO][4156] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="adb123cef83f66509da4f9499cf601ff4f666de1c943daa1f664d8d88fe06643" iface="eth0" netns="/var/run/netns/cni-2b0f27a6-9162-411c-4728-f47b3767fddb" Dec 13 14:29:25.032053 env[1231]: 2024-12-13 14:29:24.973 [INFO][4156] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="adb123cef83f66509da4f9499cf601ff4f666de1c943daa1f664d8d88fe06643" Dec 13 14:29:25.032053 env[1231]: 2024-12-13 14:29:24.973 [INFO][4156] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="adb123cef83f66509da4f9499cf601ff4f666de1c943daa1f664d8d88fe06643" Dec 13 14:29:25.032053 env[1231]: 2024-12-13 14:29:25.006 [INFO][4170] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="adb123cef83f66509da4f9499cf601ff4f666de1c943daa1f664d8d88fe06643" HandleID="k8s-pod-network.adb123cef83f66509da4f9499cf601ff4f666de1c943daa1f664d8d88fe06643" Workload="localhost-k8s-csi--node--driver--tstdc-eth0" Dec 13 14:29:25.032053 env[1231]: 2024-12-13 14:29:25.006 [INFO][4170] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:29:25.032053 env[1231]: 2024-12-13 14:29:25.006 [INFO][4170] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:29:25.032053 env[1231]: 2024-12-13 14:29:25.013 [WARNING][4170] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="adb123cef83f66509da4f9499cf601ff4f666de1c943daa1f664d8d88fe06643" HandleID="k8s-pod-network.adb123cef83f66509da4f9499cf601ff4f666de1c943daa1f664d8d88fe06643" Workload="localhost-k8s-csi--node--driver--tstdc-eth0" Dec 13 14:29:25.032053 env[1231]: 2024-12-13 14:29:25.013 [INFO][4170] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="adb123cef83f66509da4f9499cf601ff4f666de1c943daa1f664d8d88fe06643" HandleID="k8s-pod-network.adb123cef83f66509da4f9499cf601ff4f666de1c943daa1f664d8d88fe06643" Workload="localhost-k8s-csi--node--driver--tstdc-eth0" Dec 13 14:29:25.032053 env[1231]: 2024-12-13 14:29:25.015 [INFO][4170] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:29:25.032053 env[1231]: 2024-12-13 14:29:25.024 [INFO][4156] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="adb123cef83f66509da4f9499cf601ff4f666de1c943daa1f664d8d88fe06643" Dec 13 14:29:25.034570 systemd[1]: run-netns-cni\x2d2b0f27a6\x2d9162\x2d411c\x2d4728\x2df47b3767fddb.mount: Deactivated successfully. Dec 13 14:29:25.035980 env[1231]: time="2024-12-13T14:29:25.035927956Z" level=info msg="TearDown network for sandbox \"adb123cef83f66509da4f9499cf601ff4f666de1c943daa1f664d8d88fe06643\" successfully" Dec 13 14:29:25.035980 env[1231]: time="2024-12-13T14:29:25.035976988Z" level=info msg="StopPodSandbox for \"adb123cef83f66509da4f9499cf601ff4f666de1c943daa1f664d8d88fe06643\" returns successfully" Dec 13 14:29:25.037127 env[1231]: time="2024-12-13T14:29:25.037080245Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-tstdc,Uid:d48acee9-c06b-4aaa-a5e2-0d0779dceacf,Namespace:calico-system,Attempt:1,}" Dec 13 14:29:25.052268 env[1231]: 2024-12-13 14:29:24.990 [INFO][4157] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="73c809ecb32e20add5ba2387a36fe05c5f2439b3c82355a300a062a4708b6126" Dec 13 14:29:25.052268 env[1231]: 2024-12-13 14:29:24.990 [INFO][4157] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="73c809ecb32e20add5ba2387a36fe05c5f2439b3c82355a300a062a4708b6126" iface="eth0" netns="/var/run/netns/cni-6a39927e-5889-da2d-b59f-6a8f0ef9ad93" Dec 13 14:29:25.052268 env[1231]: 2024-12-13 14:29:24.990 [INFO][4157] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="73c809ecb32e20add5ba2387a36fe05c5f2439b3c82355a300a062a4708b6126" iface="eth0" netns="/var/run/netns/cni-6a39927e-5889-da2d-b59f-6a8f0ef9ad93" Dec 13 14:29:25.052268 env[1231]: 2024-12-13 14:29:24.991 [INFO][4157] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="73c809ecb32e20add5ba2387a36fe05c5f2439b3c82355a300a062a4708b6126" iface="eth0" netns="/var/run/netns/cni-6a39927e-5889-da2d-b59f-6a8f0ef9ad93" Dec 13 14:29:25.052268 env[1231]: 2024-12-13 14:29:24.991 [INFO][4157] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="73c809ecb32e20add5ba2387a36fe05c5f2439b3c82355a300a062a4708b6126" Dec 13 14:29:25.052268 env[1231]: 2024-12-13 14:29:24.991 [INFO][4157] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="73c809ecb32e20add5ba2387a36fe05c5f2439b3c82355a300a062a4708b6126" Dec 13 14:29:25.052268 env[1231]: 2024-12-13 14:29:25.038 [INFO][4176] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="73c809ecb32e20add5ba2387a36fe05c5f2439b3c82355a300a062a4708b6126" HandleID="k8s-pod-network.73c809ecb32e20add5ba2387a36fe05c5f2439b3c82355a300a062a4708b6126" Workload="localhost-k8s-coredns--76f75df574--flvr8-eth0" Dec 13 14:29:25.052268 env[1231]: 2024-12-13 14:29:25.039 [INFO][4176] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:29:25.052268 env[1231]: 2024-12-13 14:29:25.039 [INFO][4176] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:29:25.052268 env[1231]: 2024-12-13 14:29:25.045 [WARNING][4176] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="73c809ecb32e20add5ba2387a36fe05c5f2439b3c82355a300a062a4708b6126" HandleID="k8s-pod-network.73c809ecb32e20add5ba2387a36fe05c5f2439b3c82355a300a062a4708b6126" Workload="localhost-k8s-coredns--76f75df574--flvr8-eth0" Dec 13 14:29:25.052268 env[1231]: 2024-12-13 14:29:25.045 [INFO][4176] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="73c809ecb32e20add5ba2387a36fe05c5f2439b3c82355a300a062a4708b6126" HandleID="k8s-pod-network.73c809ecb32e20add5ba2387a36fe05c5f2439b3c82355a300a062a4708b6126" Workload="localhost-k8s-coredns--76f75df574--flvr8-eth0" Dec 13 14:29:25.052268 env[1231]: 2024-12-13 14:29:25.047 [INFO][4176] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:29:25.052268 env[1231]: 2024-12-13 14:29:25.050 [INFO][4157] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="73c809ecb32e20add5ba2387a36fe05c5f2439b3c82355a300a062a4708b6126" Dec 13 14:29:25.052824 env[1231]: time="2024-12-13T14:29:25.052443580Z" level=info msg="TearDown network for sandbox \"73c809ecb32e20add5ba2387a36fe05c5f2439b3c82355a300a062a4708b6126\" successfully" Dec 13 14:29:25.052824 env[1231]: time="2024-12-13T14:29:25.052479737Z" level=info msg="StopPodSandbox for \"73c809ecb32e20add5ba2387a36fe05c5f2439b3c82355a300a062a4708b6126\" returns successfully" Dec 13 14:29:25.054999 systemd[1]: run-netns-cni\x2d6a39927e\x2d5889\x2dda2d\x2db59f\x2d6a8f0ef9ad93.mount: Deactivated successfully. Dec 13 14:29:25.057050 kubelet[2075]: E1213 14:29:25.055893 2075 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:29:25.057803 env[1231]: time="2024-12-13T14:29:25.056881985Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-flvr8,Uid:d1f940d3-bfb4-4c44-ba58-bdb360e4465a,Namespace:kube-system,Attempt:1,}" Dec 13 14:29:25.062861 systemd[1]: Started sshd@16-10.0.0.112:22-10.0.0.1:37490.service. Dec 13 14:29:25.061000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.112:22-10.0.0.1:37490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:25.068823 kernel: kauditd_printk_skb: 61 callbacks suppressed Dec 13 14:29:25.068951 kernel: audit: type=1130 audit(1734100165.061:1250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.112:22-10.0.0.1:37490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:25.104000 audit[4185]: USER_ACCT pid=4185 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:25.106220 sshd[4185]: Accepted publickey for core from 10.0.0.1 port 37490 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:29:25.109000 audit[4185]: CRED_ACQ pid=4185 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:25.114229 kernel: audit: type=1101 audit(1734100165.104:1251): pid=4185 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:25.114299 kernel: audit: type=1103 audit(1734100165.109:1252): pid=4185 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:25.114330 kernel: audit: type=1006 audit(1734100165.109:1253): pid=4185 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Dec 13 14:29:25.109000 audit[4185]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3cc85560 a2=3 a3=0 items=0 ppid=1 pid=4185 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:25.121282 kernel: audit: type=1300 audit(1734100165.109:1253): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3cc85560 a2=3 a3=0 items=0 ppid=1 pid=4185 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:25.121367 kernel: audit: type=1327 audit(1734100165.109:1253): proctitle=737368643A20636F7265205B707269765D Dec 13 14:29:25.109000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:29:25.147018 sshd[4185]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:29:25.151809 systemd-logind[1219]: New session 17 of user core. Dec 13 14:29:25.152271 systemd[1]: Started session-17.scope. Dec 13 14:29:25.157000 audit[4185]: USER_START pid=4185 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:25.159000 audit[4187]: CRED_ACQ pid=4187 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:25.166663 kernel: audit: type=1105 audit(1734100165.157:1254): pid=4185 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:25.166723 kernel: audit: type=1103 audit(1734100165.159:1255): pid=4187 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:25.327333 sshd[4185]: pam_unix(sshd:session): session closed for user core Dec 13 14:29:25.328000 audit[4185]: USER_END pid=4185 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:25.330886 systemd[1]: sshd@16-10.0.0.112:22-10.0.0.1:37490.service: Deactivated successfully. Dec 13 14:29:25.331876 systemd[1]: session-17.scope: Deactivated successfully. Dec 13 14:29:25.332801 systemd-logind[1219]: Session 17 logged out. Waiting for processes to exit. Dec 13 14:29:25.328000 audit[4185]: CRED_DISP pid=4185 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:25.334194 systemd-logind[1219]: Removed session 17. Dec 13 14:29:25.338155 kernel: audit: type=1106 audit(1734100165.328:1256): pid=4185 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:25.338223 kernel: audit: type=1104 audit(1734100165.328:1257): pid=4185 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:25.328000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.112:22-10.0.0.1:37490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:25.389886 systemd-networkd[1047]: calia37df597ce7: Link UP Dec 13 14:29:25.392624 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:29:25.392821 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia37df597ce7: link becomes ready Dec 13 14:29:25.393019 systemd-networkd[1047]: calia37df597ce7: Gained carrier Dec 13 14:29:25.413730 env[1231]: 2024-12-13 14:29:25.282 [INFO][4208] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--76f75df574--flvr8-eth0 coredns-76f75df574- kube-system d1f940d3-bfb4-4c44-ba58-bdb360e4465a 1046 0 2024-12-13 14:28:30 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-76f75df574-flvr8 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calia37df597ce7 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="c2313514758d77d4cc01bf1e2265319457ff642c486848cc7071b3e1d0227a31" Namespace="kube-system" Pod="coredns-76f75df574-flvr8" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--flvr8-" Dec 13 14:29:25.413730 env[1231]: 2024-12-13 14:29:25.283 [INFO][4208] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="c2313514758d77d4cc01bf1e2265319457ff642c486848cc7071b3e1d0227a31" Namespace="kube-system" Pod="coredns-76f75df574-flvr8" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--flvr8-eth0" Dec 13 14:29:25.413730 env[1231]: 2024-12-13 14:29:25.336 [INFO][4229] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c2313514758d77d4cc01bf1e2265319457ff642c486848cc7071b3e1d0227a31" HandleID="k8s-pod-network.c2313514758d77d4cc01bf1e2265319457ff642c486848cc7071b3e1d0227a31" Workload="localhost-k8s-coredns--76f75df574--flvr8-eth0" Dec 13 14:29:25.413730 env[1231]: 2024-12-13 14:29:25.345 [INFO][4229] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c2313514758d77d4cc01bf1e2265319457ff642c486848cc7071b3e1d0227a31" HandleID="k8s-pod-network.c2313514758d77d4cc01bf1e2265319457ff642c486848cc7071b3e1d0227a31" Workload="localhost-k8s-coredns--76f75df574--flvr8-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000391410), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-76f75df574-flvr8", "timestamp":"2024-12-13 14:29:25.336388836 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:29:25.413730 env[1231]: 2024-12-13 14:29:25.345 [INFO][4229] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:29:25.413730 env[1231]: 2024-12-13 14:29:25.345 [INFO][4229] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:29:25.413730 env[1231]: 2024-12-13 14:29:25.345 [INFO][4229] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 14:29:25.413730 env[1231]: 2024-12-13 14:29:25.349 [INFO][4229] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c2313514758d77d4cc01bf1e2265319457ff642c486848cc7071b3e1d0227a31" host="localhost" Dec 13 14:29:25.413730 env[1231]: 2024-12-13 14:29:25.355 [INFO][4229] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 14:29:25.413730 env[1231]: 2024-12-13 14:29:25.359 [INFO][4229] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 14:29:25.413730 env[1231]: 2024-12-13 14:29:25.361 [INFO][4229] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 14:29:25.413730 env[1231]: 2024-12-13 14:29:25.365 [INFO][4229] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 14:29:25.413730 env[1231]: 2024-12-13 14:29:25.365 [INFO][4229] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.c2313514758d77d4cc01bf1e2265319457ff642c486848cc7071b3e1d0227a31" host="localhost" Dec 13 14:29:25.413730 env[1231]: 2024-12-13 14:29:25.367 [INFO][4229] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.c2313514758d77d4cc01bf1e2265319457ff642c486848cc7071b3e1d0227a31 Dec 13 14:29:25.413730 env[1231]: 2024-12-13 14:29:25.376 [INFO][4229] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.c2313514758d77d4cc01bf1e2265319457ff642c486848cc7071b3e1d0227a31" host="localhost" Dec 13 14:29:25.413730 env[1231]: 2024-12-13 14:29:25.383 [INFO][4229] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.c2313514758d77d4cc01bf1e2265319457ff642c486848cc7071b3e1d0227a31" host="localhost" Dec 13 14:29:25.413730 env[1231]: 2024-12-13 14:29:25.383 [INFO][4229] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.c2313514758d77d4cc01bf1e2265319457ff642c486848cc7071b3e1d0227a31" host="localhost" Dec 13 14:29:25.413730 env[1231]: 2024-12-13 14:29:25.383 [INFO][4229] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:29:25.413730 env[1231]: 2024-12-13 14:29:25.383 [INFO][4229] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="c2313514758d77d4cc01bf1e2265319457ff642c486848cc7071b3e1d0227a31" HandleID="k8s-pod-network.c2313514758d77d4cc01bf1e2265319457ff642c486848cc7071b3e1d0227a31" Workload="localhost-k8s-coredns--76f75df574--flvr8-eth0" Dec 13 14:29:25.414725 env[1231]: 2024-12-13 14:29:25.387 [INFO][4208] cni-plugin/k8s.go 386: Populated endpoint ContainerID="c2313514758d77d4cc01bf1e2265319457ff642c486848cc7071b3e1d0227a31" Namespace="kube-system" Pod="coredns-76f75df574-flvr8" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--flvr8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--flvr8-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"d1f940d3-bfb4-4c44-ba58-bdb360e4465a", ResourceVersion:"1046", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 28, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-76f75df574-flvr8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia37df597ce7", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:29:25.414725 env[1231]: 2024-12-13 14:29:25.387 [INFO][4208] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="c2313514758d77d4cc01bf1e2265319457ff642c486848cc7071b3e1d0227a31" Namespace="kube-system" Pod="coredns-76f75df574-flvr8" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--flvr8-eth0" Dec 13 14:29:25.414725 env[1231]: 2024-12-13 14:29:25.387 [INFO][4208] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calia37df597ce7 ContainerID="c2313514758d77d4cc01bf1e2265319457ff642c486848cc7071b3e1d0227a31" Namespace="kube-system" Pod="coredns-76f75df574-flvr8" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--flvr8-eth0" Dec 13 14:29:25.414725 env[1231]: 2024-12-13 14:29:25.393 [INFO][4208] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c2313514758d77d4cc01bf1e2265319457ff642c486848cc7071b3e1d0227a31" Namespace="kube-system" Pod="coredns-76f75df574-flvr8" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--flvr8-eth0" Dec 13 14:29:25.414725 env[1231]: 2024-12-13 14:29:25.394 [INFO][4208] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="c2313514758d77d4cc01bf1e2265319457ff642c486848cc7071b3e1d0227a31" Namespace="kube-system" Pod="coredns-76f75df574-flvr8" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--flvr8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--flvr8-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"d1f940d3-bfb4-4c44-ba58-bdb360e4465a", ResourceVersion:"1046", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 28, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c2313514758d77d4cc01bf1e2265319457ff642c486848cc7071b3e1d0227a31", Pod:"coredns-76f75df574-flvr8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia37df597ce7", MAC:"2a:40:c6:e8:97:f6", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:29:25.414725 env[1231]: 2024-12-13 14:29:25.407 [INFO][4208] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="c2313514758d77d4cc01bf1e2265319457ff642c486848cc7071b3e1d0227a31" Namespace="kube-system" Pod="coredns-76f75df574-flvr8" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--flvr8-eth0" Dec 13 14:29:25.443000 audit[4255]: NETFILTER_CFG table=filter:107 family=2 entries=40 op=nft_register_chain pid=4255 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:29:25.443000 audit[4255]: SYSCALL arch=c000003e syscall=46 success=yes exit=21072 a0=3 a1=7ffc2f183e70 a2=0 a3=7ffc2f183e5c items=0 ppid=3550 pid=4255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:25.443000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:29:25.467000 systemd-networkd[1047]: cali6ec18d71dc6: Link UP Dec 13 14:29:25.467221 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6ec18d71dc6: link becomes ready Dec 13 14:29:25.467187 systemd-networkd[1047]: cali6ec18d71dc6: Gained carrier Dec 13 14:29:25.497430 env[1231]: time="2024-12-13T14:29:25.497297814Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:29:25.497430 env[1231]: time="2024-12-13T14:29:25.497435401Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:29:25.497644 env[1231]: time="2024-12-13T14:29:25.497462612Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:29:25.497644 env[1231]: time="2024-12-13T14:29:25.497606011Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c2313514758d77d4cc01bf1e2265319457ff642c486848cc7071b3e1d0227a31 pid=4265 runtime=io.containerd.runc.v2 Dec 13 14:29:25.504361 env[1231]: 2024-12-13 14:29:25.258 [INFO][4188] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--tstdc-eth0 csi-node-driver- calico-system d48acee9-c06b-4aaa-a5e2-0d0779dceacf 1045 0 2024-12-13 14:28:38 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b695c467 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-tstdc eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali6ec18d71dc6 [] []}} ContainerID="40852c40fe879aab30929551dc64574e39f9d3c31bf9a908eac766e845bd4b98" Namespace="calico-system" Pod="csi-node-driver-tstdc" WorkloadEndpoint="localhost-k8s-csi--node--driver--tstdc-" Dec 13 14:29:25.504361 env[1231]: 2024-12-13 14:29:25.258 [INFO][4188] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="40852c40fe879aab30929551dc64574e39f9d3c31bf9a908eac766e845bd4b98" Namespace="calico-system" Pod="csi-node-driver-tstdc" WorkloadEndpoint="localhost-k8s-csi--node--driver--tstdc-eth0" Dec 13 14:29:25.504361 env[1231]: 2024-12-13 14:29:25.341 [INFO][4224] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="40852c40fe879aab30929551dc64574e39f9d3c31bf9a908eac766e845bd4b98" HandleID="k8s-pod-network.40852c40fe879aab30929551dc64574e39f9d3c31bf9a908eac766e845bd4b98" Workload="localhost-k8s-csi--node--driver--tstdc-eth0" Dec 13 14:29:25.504361 env[1231]: 2024-12-13 14:29:25.352 [INFO][4224] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="40852c40fe879aab30929551dc64574e39f9d3c31bf9a908eac766e845bd4b98" HandleID="k8s-pod-network.40852c40fe879aab30929551dc64574e39f9d3c31bf9a908eac766e845bd4b98" Workload="localhost-k8s-csi--node--driver--tstdc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000050f80), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-tstdc", "timestamp":"2024-12-13 14:29:25.341968129 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:29:25.504361 env[1231]: 2024-12-13 14:29:25.352 [INFO][4224] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:29:25.504361 env[1231]: 2024-12-13 14:29:25.383 [INFO][4224] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:29:25.504361 env[1231]: 2024-12-13 14:29:25.383 [INFO][4224] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 14:29:25.504361 env[1231]: 2024-12-13 14:29:25.385 [INFO][4224] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.40852c40fe879aab30929551dc64574e39f9d3c31bf9a908eac766e845bd4b98" host="localhost" Dec 13 14:29:25.504361 env[1231]: 2024-12-13 14:29:25.390 [INFO][4224] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 14:29:25.504361 env[1231]: 2024-12-13 14:29:25.397 [INFO][4224] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 14:29:25.504361 env[1231]: 2024-12-13 14:29:25.399 [INFO][4224] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 14:29:25.504361 env[1231]: 2024-12-13 14:29:25.401 [INFO][4224] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 14:29:25.504361 env[1231]: 2024-12-13 14:29:25.402 [INFO][4224] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.40852c40fe879aab30929551dc64574e39f9d3c31bf9a908eac766e845bd4b98" host="localhost" Dec 13 14:29:25.504361 env[1231]: 2024-12-13 14:29:25.407 [INFO][4224] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.40852c40fe879aab30929551dc64574e39f9d3c31bf9a908eac766e845bd4b98 Dec 13 14:29:25.504361 env[1231]: 2024-12-13 14:29:25.435 [INFO][4224] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.40852c40fe879aab30929551dc64574e39f9d3c31bf9a908eac766e845bd4b98" host="localhost" Dec 13 14:29:25.504361 env[1231]: 2024-12-13 14:29:25.457 [INFO][4224] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.40852c40fe879aab30929551dc64574e39f9d3c31bf9a908eac766e845bd4b98" host="localhost" Dec 13 14:29:25.504361 env[1231]: 2024-12-13 14:29:25.457 [INFO][4224] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.40852c40fe879aab30929551dc64574e39f9d3c31bf9a908eac766e845bd4b98" host="localhost" Dec 13 14:29:25.504361 env[1231]: 2024-12-13 14:29:25.457 [INFO][4224] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:29:25.504361 env[1231]: 2024-12-13 14:29:25.457 [INFO][4224] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="40852c40fe879aab30929551dc64574e39f9d3c31bf9a908eac766e845bd4b98" HandleID="k8s-pod-network.40852c40fe879aab30929551dc64574e39f9d3c31bf9a908eac766e845bd4b98" Workload="localhost-k8s-csi--node--driver--tstdc-eth0" Dec 13 14:29:25.504995 env[1231]: 2024-12-13 14:29:25.464 [INFO][4188] cni-plugin/k8s.go 386: Populated endpoint ContainerID="40852c40fe879aab30929551dc64574e39f9d3c31bf9a908eac766e845bd4b98" Namespace="calico-system" Pod="csi-node-driver-tstdc" WorkloadEndpoint="localhost-k8s-csi--node--driver--tstdc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--tstdc-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d48acee9-c06b-4aaa-a5e2-0d0779dceacf", ResourceVersion:"1045", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 28, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-tstdc", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali6ec18d71dc6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:29:25.504995 env[1231]: 2024-12-13 14:29:25.464 [INFO][4188] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="40852c40fe879aab30929551dc64574e39f9d3c31bf9a908eac766e845bd4b98" Namespace="calico-system" Pod="csi-node-driver-tstdc" WorkloadEndpoint="localhost-k8s-csi--node--driver--tstdc-eth0" Dec 13 14:29:25.504995 env[1231]: 2024-12-13 14:29:25.464 [INFO][4188] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali6ec18d71dc6 ContainerID="40852c40fe879aab30929551dc64574e39f9d3c31bf9a908eac766e845bd4b98" Namespace="calico-system" Pod="csi-node-driver-tstdc" WorkloadEndpoint="localhost-k8s-csi--node--driver--tstdc-eth0" Dec 13 14:29:25.504995 env[1231]: 2024-12-13 14:29:25.466 [INFO][4188] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="40852c40fe879aab30929551dc64574e39f9d3c31bf9a908eac766e845bd4b98" Namespace="calico-system" Pod="csi-node-driver-tstdc" WorkloadEndpoint="localhost-k8s-csi--node--driver--tstdc-eth0" Dec 13 14:29:25.504995 env[1231]: 2024-12-13 14:29:25.467 [INFO][4188] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="40852c40fe879aab30929551dc64574e39f9d3c31bf9a908eac766e845bd4b98" Namespace="calico-system" Pod="csi-node-driver-tstdc" WorkloadEndpoint="localhost-k8s-csi--node--driver--tstdc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--tstdc-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d48acee9-c06b-4aaa-a5e2-0d0779dceacf", ResourceVersion:"1045", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 28, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"40852c40fe879aab30929551dc64574e39f9d3c31bf9a908eac766e845bd4b98", Pod:"csi-node-driver-tstdc", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali6ec18d71dc6", MAC:"16:20:ba:a0:d9:e1", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:29:25.504995 env[1231]: 2024-12-13 14:29:25.500 [INFO][4188] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="40852c40fe879aab30929551dc64574e39f9d3c31bf9a908eac766e845bd4b98" Namespace="calico-system" Pod="csi-node-driver-tstdc" WorkloadEndpoint="localhost-k8s-csi--node--driver--tstdc-eth0" Dec 13 14:29:25.516000 audit[4295]: NETFILTER_CFG table=filter:108 family=2 entries=42 op=nft_register_chain pid=4295 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:29:25.516000 audit[4295]: SYSCALL arch=c000003e syscall=46 success=yes exit=21508 a0=3 a1=7ffdd568e730 a2=0 a3=7ffdd568e71c items=0 ppid=3550 pid=4295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:25.516000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:29:25.520915 systemd[1]: Started cri-containerd-c2313514758d77d4cc01bf1e2265319457ff642c486848cc7071b3e1d0227a31.scope. Dec 13 14:29:25.529674 env[1231]: time="2024-12-13T14:29:25.529562665Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:29:25.529674 env[1231]: time="2024-12-13T14:29:25.529657783Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:29:25.529879 env[1231]: time="2024-12-13T14:29:25.529695182Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:29:25.530034 env[1231]: time="2024-12-13T14:29:25.529970018Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/40852c40fe879aab30929551dc64574e39f9d3c31bf9a908eac766e845bd4b98 pid=4310 runtime=io.containerd.runc.v2 Dec 13 14:29:25.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.535000 audit: BPF prog-id=170 op=LOAD Dec 13 14:29:25.536000 audit[4276]: AVC avc: denied { bpf } for pid=4276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.536000 audit[4276]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4265 pid=4276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:25.536000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332333133353134373538643737643463633031626631653232363533 Dec 13 14:29:25.536000 audit[4276]: AVC avc: denied { perfmon } for pid=4276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.536000 audit[4276]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4265 pid=4276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:25.536000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332333133353134373538643737643463633031626631653232363533 Dec 13 14:29:25.536000 audit[4276]: AVC avc: denied { bpf } for pid=4276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.536000 audit[4276]: AVC avc: denied { bpf } for pid=4276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.536000 audit[4276]: AVC avc: denied { bpf } for pid=4276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.536000 audit[4276]: AVC avc: denied { perfmon } for pid=4276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.536000 audit[4276]: AVC avc: denied { perfmon } for pid=4276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.536000 audit[4276]: AVC avc: denied { perfmon } for pid=4276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.536000 audit[4276]: AVC avc: denied { perfmon } for pid=4276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.536000 audit[4276]: AVC avc: denied { perfmon } for pid=4276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.536000 audit[4276]: AVC avc: denied { bpf } for pid=4276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.536000 audit[4276]: AVC avc: denied { bpf } for pid=4276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.536000 audit: BPF prog-id=171 op=LOAD Dec 13 14:29:25.536000 audit[4276]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000300ac0 items=0 ppid=4265 pid=4276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:25.536000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332333133353134373538643737643463633031626631653232363533 Dec 13 14:29:25.536000 audit[4276]: AVC avc: denied { bpf } for pid=4276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.536000 audit[4276]: AVC avc: denied { bpf } for pid=4276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.536000 audit[4276]: AVC avc: denied { perfmon } for pid=4276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.536000 audit[4276]: AVC avc: denied { perfmon } for pid=4276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.536000 audit[4276]: AVC avc: denied { perfmon } for pid=4276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.536000 audit[4276]: AVC avc: denied { perfmon } for pid=4276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.536000 audit[4276]: AVC avc: denied { perfmon } for pid=4276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.536000 audit[4276]: AVC avc: denied { bpf } for pid=4276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.536000 audit[4276]: AVC avc: denied { bpf } for pid=4276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.536000 audit: BPF prog-id=172 op=LOAD Dec 13 14:29:25.536000 audit[4276]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000300b08 items=0 ppid=4265 pid=4276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:25.536000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332333133353134373538643737643463633031626631653232363533 Dec 13 14:29:25.536000 audit: BPF prog-id=172 op=UNLOAD Dec 13 14:29:25.536000 audit: BPF prog-id=171 op=UNLOAD Dec 13 14:29:25.536000 audit[4276]: AVC avc: denied { bpf } for pid=4276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.536000 audit[4276]: AVC avc: denied { bpf } for pid=4276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.536000 audit[4276]: AVC avc: denied { bpf } for pid=4276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.536000 audit[4276]: AVC avc: denied { perfmon } for pid=4276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.536000 audit[4276]: AVC avc: denied { perfmon } for pid=4276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.536000 audit[4276]: AVC avc: denied { perfmon } for pid=4276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.536000 audit[4276]: AVC avc: denied { perfmon } for pid=4276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.536000 audit[4276]: AVC avc: denied { perfmon } for pid=4276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.536000 audit[4276]: AVC avc: denied { bpf } for pid=4276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.536000 audit[4276]: AVC avc: denied { bpf } for pid=4276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.536000 audit: BPF prog-id=173 op=LOAD Dec 13 14:29:25.536000 audit[4276]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000300f18 items=0 ppid=4265 pid=4276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:25.536000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332333133353134373538643737643463633031626631653232363533 Dec 13 14:29:25.538554 systemd-resolved[1167]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:29:25.548471 systemd[1]: Started cri-containerd-40852c40fe879aab30929551dc64574e39f9d3c31bf9a908eac766e845bd4b98.scope. Dec 13 14:29:25.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.564000 audit: BPF prog-id=174 op=LOAD Dec 13 14:29:25.565000 audit[4325]: AVC avc: denied { bpf } for pid=4325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.565000 audit[4325]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=4310 pid=4325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:25.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430383532633430666538373961616233303932393535316463363435 Dec 13 14:29:25.565000 audit[4325]: AVC avc: denied { perfmon } for pid=4325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.565000 audit[4325]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019f6b0 a2=3c a3=c items=0 ppid=4310 pid=4325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:25.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430383532633430666538373961616233303932393535316463363435 Dec 13 14:29:25.566000 audit[4325]: AVC avc: denied { bpf } for pid=4325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.566000 audit[4325]: AVC avc: denied { bpf } for pid=4325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.566000 audit[4325]: AVC avc: denied { bpf } for pid=4325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.566000 audit[4325]: AVC avc: denied { perfmon } for pid=4325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.566000 audit[4325]: AVC avc: denied { perfmon } for pid=4325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.566000 audit[4325]: AVC avc: denied { perfmon } for pid=4325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.566000 audit[4325]: AVC avc: denied { perfmon } for pid=4325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.566000 audit[4325]: AVC avc: denied { perfmon } for pid=4325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.566000 audit[4325]: AVC avc: denied { bpf } for pid=4325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.566000 audit[4325]: AVC avc: denied { bpf } for pid=4325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.566000 audit: BPF prog-id=175 op=LOAD Dec 13 14:29:25.566000 audit[4325]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019f9d8 a2=78 a3=c00032e950 items=0 ppid=4310 pid=4325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:25.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430383532633430666538373961616233303932393535316463363435 Dec 13 14:29:25.566000 audit[4325]: AVC avc: denied { bpf } for pid=4325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.566000 audit[4325]: AVC avc: denied { bpf } for pid=4325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.566000 audit[4325]: AVC avc: denied { perfmon } for pid=4325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.566000 audit[4325]: AVC avc: denied { perfmon } for pid=4325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.566000 audit[4325]: AVC avc: denied { perfmon } for pid=4325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.566000 audit[4325]: AVC avc: denied { perfmon } for pid=4325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.566000 audit[4325]: AVC avc: denied { perfmon } for pid=4325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.566000 audit[4325]: AVC avc: denied { bpf } for pid=4325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.566000 audit[4325]: AVC avc: denied { bpf } for pid=4325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.566000 audit: BPF prog-id=176 op=LOAD Dec 13 14:29:25.566000 audit[4325]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019f770 a2=78 a3=c00032e998 items=0 ppid=4310 pid=4325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:25.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430383532633430666538373961616233303932393535316463363435 Dec 13 14:29:25.567000 audit: BPF prog-id=176 op=UNLOAD Dec 13 14:29:25.567000 audit: BPF prog-id=175 op=UNLOAD Dec 13 14:29:25.568000 audit[4325]: AVC avc: denied { bpf } for pid=4325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.568000 audit[4325]: AVC avc: denied { bpf } for pid=4325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.568000 audit[4325]: AVC avc: denied { bpf } for pid=4325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.568000 audit[4325]: AVC avc: denied { perfmon } for pid=4325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.568000 audit[4325]: AVC avc: denied { perfmon } for pid=4325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.568000 audit[4325]: AVC avc: denied { perfmon } for pid=4325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.568000 audit[4325]: AVC avc: denied { perfmon } for pid=4325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.568000 audit[4325]: AVC avc: denied { perfmon } for pid=4325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.568000 audit[4325]: AVC avc: denied { bpf } for pid=4325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.568000 audit[4325]: AVC avc: denied { bpf } for pid=4325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.568000 audit: BPF prog-id=177 op=LOAD Dec 13 14:29:25.568000 audit[4325]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019fc30 a2=78 a3=c00032eda8 items=0 ppid=4310 pid=4325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:25.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430383532633430666538373961616233303932393535316463363435 Dec 13 14:29:25.570724 env[1231]: time="2024-12-13T14:29:25.570634045Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-flvr8,Uid:d1f940d3-bfb4-4c44-ba58-bdb360e4465a,Namespace:kube-system,Attempt:1,} returns sandbox id \"c2313514758d77d4cc01bf1e2265319457ff642c486848cc7071b3e1d0227a31\"" Dec 13 14:29:25.571467 kubelet[2075]: E1213 14:29:25.571434 2075 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:29:25.571845 systemd-resolved[1167]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:29:25.574473 env[1231]: time="2024-12-13T14:29:25.574426080Z" level=info msg="CreateContainer within sandbox \"c2313514758d77d4cc01bf1e2265319457ff642c486848cc7071b3e1d0227a31\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 14:29:25.587875 env[1231]: time="2024-12-13T14:29:25.587822851Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-tstdc,Uid:d48acee9-c06b-4aaa-a5e2-0d0779dceacf,Namespace:calico-system,Attempt:1,} returns sandbox id \"40852c40fe879aab30929551dc64574e39f9d3c31bf9a908eac766e845bd4b98\"" Dec 13 14:29:25.595192 env[1231]: time="2024-12-13T14:29:25.595144298Z" level=info msg="CreateContainer within sandbox \"c2313514758d77d4cc01bf1e2265319457ff642c486848cc7071b3e1d0227a31\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"e227dd17c216953995c80cf7937625a66164f2802d15b95737cdf05cd5bc85bc\"" Dec 13 14:29:25.595684 env[1231]: time="2024-12-13T14:29:25.595647100Z" level=info msg="StartContainer for \"e227dd17c216953995c80cf7937625a66164f2802d15b95737cdf05cd5bc85bc\"" Dec 13 14:29:25.615430 systemd[1]: Started cri-containerd-e227dd17c216953995c80cf7937625a66164f2802d15b95737cdf05cd5bc85bc.scope. Dec 13 14:29:25.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.631000 audit: BPF prog-id=178 op=LOAD Dec 13 14:29:25.632000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.632000 audit[4359]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4265 pid=4359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:25.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532323764643137633231363935333939356338306366373933373632 Dec 13 14:29:25.632000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.632000 audit[4359]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4265 pid=4359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:25.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532323764643137633231363935333939356338306366373933373632 Dec 13 14:29:25.632000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.632000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.632000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.632000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.632000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.632000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.632000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.632000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.632000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.632000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.632000 audit: BPF prog-id=179 op=LOAD Dec 13 14:29:25.632000 audit[4359]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00028d290 items=0 ppid=4265 pid=4359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:25.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532323764643137633231363935333939356338306366373933373632 Dec 13 14:29:25.632000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.632000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.632000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.632000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.632000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.632000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.632000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.632000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.632000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.632000 audit: BPF prog-id=180 op=LOAD Dec 13 14:29:25.632000 audit[4359]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00028d2d8 items=0 ppid=4265 pid=4359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:25.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532323764643137633231363935333939356338306366373933373632 Dec 13 14:29:25.632000 audit: BPF prog-id=180 op=UNLOAD Dec 13 14:29:25.632000 audit: BPF prog-id=179 op=UNLOAD Dec 13 14:29:25.632000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.632000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.632000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.632000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.632000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.632000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.632000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.632000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.632000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.632000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:25.632000 audit: BPF prog-id=181 op=LOAD Dec 13 14:29:25.632000 audit[4359]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00028d6e8 items=0 ppid=4265 pid=4359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:25.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532323764643137633231363935333939356338306366373933373632 Dec 13 14:29:25.647135 env[1231]: time="2024-12-13T14:29:25.647064916Z" level=info msg="StartContainer for \"e227dd17c216953995c80cf7937625a66164f2802d15b95737cdf05cd5bc85bc\" returns successfully" Dec 13 14:29:25.902054 env[1231]: time="2024-12-13T14:29:25.902002754Z" level=info msg="StopPodSandbox for \"e748bd5aa30256f12d4430cae505697bd2b9a24d37b89947f82c485c4caee13a\"" Dec 13 14:29:25.980049 env[1231]: 2024-12-13 14:29:25.948 [INFO][4407] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e748bd5aa30256f12d4430cae505697bd2b9a24d37b89947f82c485c4caee13a" Dec 13 14:29:25.980049 env[1231]: 2024-12-13 14:29:25.948 [INFO][4407] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e748bd5aa30256f12d4430cae505697bd2b9a24d37b89947f82c485c4caee13a" iface="eth0" netns="/var/run/netns/cni-ea856bb5-e312-b152-14c6-9d69bea58f79" Dec 13 14:29:25.980049 env[1231]: 2024-12-13 14:29:25.948 [INFO][4407] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e748bd5aa30256f12d4430cae505697bd2b9a24d37b89947f82c485c4caee13a" iface="eth0" netns="/var/run/netns/cni-ea856bb5-e312-b152-14c6-9d69bea58f79" Dec 13 14:29:25.980049 env[1231]: 2024-12-13 14:29:25.948 [INFO][4407] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e748bd5aa30256f12d4430cae505697bd2b9a24d37b89947f82c485c4caee13a" iface="eth0" netns="/var/run/netns/cni-ea856bb5-e312-b152-14c6-9d69bea58f79" Dec 13 14:29:25.980049 env[1231]: 2024-12-13 14:29:25.948 [INFO][4407] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e748bd5aa30256f12d4430cae505697bd2b9a24d37b89947f82c485c4caee13a" Dec 13 14:29:25.980049 env[1231]: 2024-12-13 14:29:25.948 [INFO][4407] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e748bd5aa30256f12d4430cae505697bd2b9a24d37b89947f82c485c4caee13a" Dec 13 14:29:25.980049 env[1231]: 2024-12-13 14:29:25.970 [INFO][4415] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e748bd5aa30256f12d4430cae505697bd2b9a24d37b89947f82c485c4caee13a" HandleID="k8s-pod-network.e748bd5aa30256f12d4430cae505697bd2b9a24d37b89947f82c485c4caee13a" Workload="localhost-k8s-calico--kube--controllers--78f4954bf9--7pxmq-eth0" Dec 13 14:29:25.980049 env[1231]: 2024-12-13 14:29:25.970 [INFO][4415] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:29:25.980049 env[1231]: 2024-12-13 14:29:25.970 [INFO][4415] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:29:25.980049 env[1231]: 2024-12-13 14:29:25.976 [WARNING][4415] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e748bd5aa30256f12d4430cae505697bd2b9a24d37b89947f82c485c4caee13a" HandleID="k8s-pod-network.e748bd5aa30256f12d4430cae505697bd2b9a24d37b89947f82c485c4caee13a" Workload="localhost-k8s-calico--kube--controllers--78f4954bf9--7pxmq-eth0" Dec 13 14:29:25.980049 env[1231]: 2024-12-13 14:29:25.976 [INFO][4415] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e748bd5aa30256f12d4430cae505697bd2b9a24d37b89947f82c485c4caee13a" HandleID="k8s-pod-network.e748bd5aa30256f12d4430cae505697bd2b9a24d37b89947f82c485c4caee13a" Workload="localhost-k8s-calico--kube--controllers--78f4954bf9--7pxmq-eth0" Dec 13 14:29:25.980049 env[1231]: 2024-12-13 14:29:25.977 [INFO][4415] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:29:25.980049 env[1231]: 2024-12-13 14:29:25.978 [INFO][4407] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e748bd5aa30256f12d4430cae505697bd2b9a24d37b89947f82c485c4caee13a" Dec 13 14:29:25.981003 env[1231]: time="2024-12-13T14:29:25.980951101Z" level=info msg="TearDown network for sandbox \"e748bd5aa30256f12d4430cae505697bd2b9a24d37b89947f82c485c4caee13a\" successfully" Dec 13 14:29:25.981003 env[1231]: time="2024-12-13T14:29:25.980994602Z" level=info msg="StopPodSandbox for \"e748bd5aa30256f12d4430cae505697bd2b9a24d37b89947f82c485c4caee13a\" returns successfully" Dec 13 14:29:25.981690 env[1231]: time="2024-12-13T14:29:25.981668515Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-78f4954bf9-7pxmq,Uid:c769c3a1-a661-47f5-890d-b6c9415fb6c6,Namespace:calico-system,Attempt:1,}" Dec 13 14:29:26.038000 systemd[1]: run-netns-cni\x2dea856bb5\x2de312\x2db152\x2d14c6\x2d9d69bea58f79.mount: Deactivated successfully. Dec 13 14:29:26.070486 kubelet[2075]: E1213 14:29:26.070346 2075 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:29:26.180353 kubelet[2075]: I1213 14:29:26.179112 2075 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-flvr8" podStartSLOduration=56.179052519 podStartE2EDuration="56.179052519s" podCreationTimestamp="2024-12-13 14:28:30 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:29:26.178846693 +0000 UTC m=+69.367582048" watchObservedRunningTime="2024-12-13 14:29:26.179052519 +0000 UTC m=+69.367787874" Dec 13 14:29:26.227000 audit[4423]: NETFILTER_CFG table=filter:109 family=2 entries=10 op=nft_register_rule pid=4423 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:26.227000 audit[4423]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffde634dc60 a2=0 a3=7ffde634dc4c items=0 ppid=2274 pid=4423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:26.227000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:29:26.232000 audit[4423]: NETFILTER_CFG table=nat:110 family=2 entries=44 op=nft_register_rule pid=4423 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:26.232000 audit[4423]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffde634dc60 a2=0 a3=7ffde634dc4c items=0 ppid=2274 pid=4423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:26.232000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:29:26.348000 audit[4425]: NETFILTER_CFG table=filter:111 family=2 entries=10 op=nft_register_rule pid=4425 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:26.348000 audit[4425]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fffbd525170 a2=0 a3=7fffbd52515c items=0 ppid=2274 pid=4425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:26.348000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:29:26.367000 audit[4425]: NETFILTER_CFG table=nat:112 family=2 entries=56 op=nft_register_chain pid=4425 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:26.367000 audit[4425]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fffbd525170 a2=0 a3=7fffbd52515c items=0 ppid=2274 pid=4425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:26.367000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:29:26.628812 env[1231]: time="2024-12-13T14:29:26.628763197Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:26.656586 env[1231]: time="2024-12-13T14:29:26.656527815Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:26.675836 env[1231]: time="2024-12-13T14:29:26.675784842Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:26.685645 systemd-networkd[1047]: calia37df597ce7: Gained IPv6LL Dec 13 14:29:26.721556 env[1231]: time="2024-12-13T14:29:26.721474499Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:26.722194 env[1231]: time="2024-12-13T14:29:26.722146519Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 14:29:26.723228 env[1231]: time="2024-12-13T14:29:26.723208931Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 14:29:26.724333 env[1231]: time="2024-12-13T14:29:26.724310967Z" level=info msg="CreateContainer within sandbox \"ec7e367cc720a1ebaf1cb23a380164ad3004cebed3666bd73c882b9e3c378e63\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 14:29:26.740141 systemd-networkd[1047]: caliaa2c9b93311: Link UP Dec 13 14:29:26.743296 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:29:26.743450 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliaa2c9b93311: link becomes ready Dec 13 14:29:26.743747 systemd-networkd[1047]: caliaa2c9b93311: Gained carrier Dec 13 14:29:26.745000 audit[1953]: AVC avc: denied { watch } for pid=1953 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c591,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:29:26.745000 audit[1953]: AVC avc: denied { watch } for pid=1953 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c591,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:29:26.745000 audit[1953]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f15380 a2=fc6 a3=0 items=0 ppid=1804 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c591,c683 key=(null) Dec 13 14:29:26.745000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:29:26.745000 audit[1953]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c373a0 a2=fc6 a3=0 items=0 ppid=1804 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c591,c683 key=(null) Dec 13 14:29:26.745000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:29:26.746000 audit[1953]: AVC avc: denied { watch } for pid=1953 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c591,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:29:26.746000 audit[1953]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f153c0 a2=fc6 a3=0 items=0 ppid=1804 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c591,c683 key=(null) Dec 13 14:29:26.746000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:29:26.747000 audit[1953]: AVC avc: denied { watch } for pid=1953 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c591,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:29:26.747000 audit[1953]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=c001c09cc0 a2=fc6 a3=0 items=0 ppid=1804 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c591,c683 key=(null) Dec 13 14:29:26.747000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:29:26.775642 env[1231]: 2024-12-13 14:29:26.644 [INFO][4427] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--78f4954bf9--7pxmq-eth0 calico-kube-controllers-78f4954bf9- calico-system c769c3a1-a661-47f5-890d-b6c9415fb6c6 1067 0 2024-12-13 14:28:38 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:78f4954bf9 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-78f4954bf9-7pxmq eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] caliaa2c9b93311 [] []}} ContainerID="07c8bd103a7fc96108c205040d282e712bf3cda1cb0e6204acbf77d39816f0ae" Namespace="calico-system" Pod="calico-kube-controllers-78f4954bf9-7pxmq" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--78f4954bf9--7pxmq-" Dec 13 14:29:26.775642 env[1231]: 2024-12-13 14:29:26.644 [INFO][4427] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="07c8bd103a7fc96108c205040d282e712bf3cda1cb0e6204acbf77d39816f0ae" Namespace="calico-system" Pod="calico-kube-controllers-78f4954bf9-7pxmq" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--78f4954bf9--7pxmq-eth0" Dec 13 14:29:26.775642 env[1231]: 2024-12-13 14:29:26.679 [INFO][4441] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="07c8bd103a7fc96108c205040d282e712bf3cda1cb0e6204acbf77d39816f0ae" HandleID="k8s-pod-network.07c8bd103a7fc96108c205040d282e712bf3cda1cb0e6204acbf77d39816f0ae" Workload="localhost-k8s-calico--kube--controllers--78f4954bf9--7pxmq-eth0" Dec 13 14:29:26.775642 env[1231]: 2024-12-13 14:29:26.686 [INFO][4441] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="07c8bd103a7fc96108c205040d282e712bf3cda1cb0e6204acbf77d39816f0ae" HandleID="k8s-pod-network.07c8bd103a7fc96108c205040d282e712bf3cda1cb0e6204acbf77d39816f0ae" Workload="localhost-k8s-calico--kube--controllers--78f4954bf9--7pxmq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000405640), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-78f4954bf9-7pxmq", "timestamp":"2024-12-13 14:29:26.679456486 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:29:26.775642 env[1231]: 2024-12-13 14:29:26.687 [INFO][4441] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:29:26.775642 env[1231]: 2024-12-13 14:29:26.687 [INFO][4441] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:29:26.775642 env[1231]: 2024-12-13 14:29:26.687 [INFO][4441] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 14:29:26.775642 env[1231]: 2024-12-13 14:29:26.689 [INFO][4441] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.07c8bd103a7fc96108c205040d282e712bf3cda1cb0e6204acbf77d39816f0ae" host="localhost" Dec 13 14:29:26.775642 env[1231]: 2024-12-13 14:29:26.693 [INFO][4441] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 14:29:26.775642 env[1231]: 2024-12-13 14:29:26.696 [INFO][4441] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 14:29:26.775642 env[1231]: 2024-12-13 14:29:26.698 [INFO][4441] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 14:29:26.775642 env[1231]: 2024-12-13 14:29:26.700 [INFO][4441] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 14:29:26.775642 env[1231]: 2024-12-13 14:29:26.700 [INFO][4441] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.07c8bd103a7fc96108c205040d282e712bf3cda1cb0e6204acbf77d39816f0ae" host="localhost" Dec 13 14:29:26.775642 env[1231]: 2024-12-13 14:29:26.701 [INFO][4441] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.07c8bd103a7fc96108c205040d282e712bf3cda1cb0e6204acbf77d39816f0ae Dec 13 14:29:26.775642 env[1231]: 2024-12-13 14:29:26.717 [INFO][4441] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.07c8bd103a7fc96108c205040d282e712bf3cda1cb0e6204acbf77d39816f0ae" host="localhost" Dec 13 14:29:26.775642 env[1231]: 2024-12-13 14:29:26.736 [INFO][4441] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.07c8bd103a7fc96108c205040d282e712bf3cda1cb0e6204acbf77d39816f0ae" host="localhost" Dec 13 14:29:26.775642 env[1231]: 2024-12-13 14:29:26.736 [INFO][4441] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.07c8bd103a7fc96108c205040d282e712bf3cda1cb0e6204acbf77d39816f0ae" host="localhost" Dec 13 14:29:26.775642 env[1231]: 2024-12-13 14:29:26.736 [INFO][4441] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:29:26.775642 env[1231]: 2024-12-13 14:29:26.736 [INFO][4441] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="07c8bd103a7fc96108c205040d282e712bf3cda1cb0e6204acbf77d39816f0ae" HandleID="k8s-pod-network.07c8bd103a7fc96108c205040d282e712bf3cda1cb0e6204acbf77d39816f0ae" Workload="localhost-k8s-calico--kube--controllers--78f4954bf9--7pxmq-eth0" Dec 13 14:29:26.776550 env[1231]: 2024-12-13 14:29:26.738 [INFO][4427] cni-plugin/k8s.go 386: Populated endpoint ContainerID="07c8bd103a7fc96108c205040d282e712bf3cda1cb0e6204acbf77d39816f0ae" Namespace="calico-system" Pod="calico-kube-controllers-78f4954bf9-7pxmq" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--78f4954bf9--7pxmq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--78f4954bf9--7pxmq-eth0", GenerateName:"calico-kube-controllers-78f4954bf9-", Namespace:"calico-system", SelfLink:"", UID:"c769c3a1-a661-47f5-890d-b6c9415fb6c6", ResourceVersion:"1067", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 28, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"78f4954bf9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-78f4954bf9-7pxmq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliaa2c9b93311", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:29:26.776550 env[1231]: 2024-12-13 14:29:26.738 [INFO][4427] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="07c8bd103a7fc96108c205040d282e712bf3cda1cb0e6204acbf77d39816f0ae" Namespace="calico-system" Pod="calico-kube-controllers-78f4954bf9-7pxmq" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--78f4954bf9--7pxmq-eth0" Dec 13 14:29:26.776550 env[1231]: 2024-12-13 14:29:26.738 [INFO][4427] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to caliaa2c9b93311 ContainerID="07c8bd103a7fc96108c205040d282e712bf3cda1cb0e6204acbf77d39816f0ae" Namespace="calico-system" Pod="calico-kube-controllers-78f4954bf9-7pxmq" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--78f4954bf9--7pxmq-eth0" Dec 13 14:29:26.776550 env[1231]: 2024-12-13 14:29:26.744 [INFO][4427] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="07c8bd103a7fc96108c205040d282e712bf3cda1cb0e6204acbf77d39816f0ae" Namespace="calico-system" Pod="calico-kube-controllers-78f4954bf9-7pxmq" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--78f4954bf9--7pxmq-eth0" Dec 13 14:29:26.776550 env[1231]: 2024-12-13 14:29:26.745 [INFO][4427] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="07c8bd103a7fc96108c205040d282e712bf3cda1cb0e6204acbf77d39816f0ae" Namespace="calico-system" Pod="calico-kube-controllers-78f4954bf9-7pxmq" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--78f4954bf9--7pxmq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--78f4954bf9--7pxmq-eth0", GenerateName:"calico-kube-controllers-78f4954bf9-", Namespace:"calico-system", SelfLink:"", UID:"c769c3a1-a661-47f5-890d-b6c9415fb6c6", ResourceVersion:"1067", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 28, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"78f4954bf9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"07c8bd103a7fc96108c205040d282e712bf3cda1cb0e6204acbf77d39816f0ae", Pod:"calico-kube-controllers-78f4954bf9-7pxmq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliaa2c9b93311", MAC:"92:aa:52:68:70:81", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:29:26.776550 env[1231]: 2024-12-13 14:29:26.771 [INFO][4427] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="07c8bd103a7fc96108c205040d282e712bf3cda1cb0e6204acbf77d39816f0ae" Namespace="calico-system" Pod="calico-kube-controllers-78f4954bf9-7pxmq" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--78f4954bf9--7pxmq-eth0" Dec 13 14:29:26.777522 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2908292859.mount: Deactivated successfully. Dec 13 14:29:26.783000 audit[4462]: NETFILTER_CFG table=filter:113 family=2 entries=48 op=nft_register_chain pid=4462 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:29:26.783000 audit[4462]: SYSCALL arch=c000003e syscall=46 success=yes exit=23852 a0=3 a1=7ffdd3ea9bb0 a2=0 a3=7ffdd3ea9b9c items=0 ppid=3550 pid=4462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:26.783000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:29:26.836730 env[1231]: time="2024-12-13T14:29:26.836634802Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:29:26.836730 env[1231]: time="2024-12-13T14:29:26.836683964Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:29:26.836730 env[1231]: time="2024-12-13T14:29:26.836694313Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:29:26.837274 env[1231]: time="2024-12-13T14:29:26.837200212Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/07c8bd103a7fc96108c205040d282e712bf3cda1cb0e6204acbf77d39816f0ae pid=4470 runtime=io.containerd.runc.v2 Dec 13 14:29:26.842666 env[1231]: time="2024-12-13T14:29:26.842610667Z" level=info msg="CreateContainer within sandbox \"ec7e367cc720a1ebaf1cb23a380164ad3004cebed3666bd73c882b9e3c378e63\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"f129fde6e115e33f88d2a329ce51b61e7afdeb08159d9a537488d772c9dce2f7\"" Dec 13 14:29:26.844559 env[1231]: time="2024-12-13T14:29:26.844517872Z" level=info msg="StartContainer for \"f129fde6e115e33f88d2a329ce51b61e7afdeb08159d9a537488d772c9dce2f7\"" Dec 13 14:29:26.850236 systemd[1]: Started cri-containerd-07c8bd103a7fc96108c205040d282e712bf3cda1cb0e6204acbf77d39816f0ae.scope. Dec 13 14:29:26.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.864000 audit: BPF prog-id=182 op=LOAD Dec 13 14:29:26.866000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.866000 audit[4480]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4470 pid=4480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:26.866000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037633862643130336137666339363130386332303530343064323832 Dec 13 14:29:26.866000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.866000 audit[4480]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=4470 pid=4480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:26.866000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037633862643130336137666339363130386332303530343064323832 Dec 13 14:29:26.866000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.866000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.866000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.866000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.866000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.866000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.866000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.866000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.866000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.866000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.866000 audit: BPF prog-id=183 op=LOAD Dec 13 14:29:26.866000 audit[4480]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c00028bbf0 items=0 ppid=4470 pid=4480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:26.866000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037633862643130336137666339363130386332303530343064323832 Dec 13 14:29:26.866000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.866000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.866000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.866000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.866000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.866000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.866000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.866000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.866000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.866000 audit: BPF prog-id=184 op=LOAD Dec 13 14:29:26.866000 audit[4480]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c00028bc38 items=0 ppid=4470 pid=4480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:26.866000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037633862643130336137666339363130386332303530343064323832 Dec 13 14:29:26.866000 audit: BPF prog-id=184 op=UNLOAD Dec 13 14:29:26.866000 audit: BPF prog-id=183 op=UNLOAD Dec 13 14:29:26.866000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.866000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.866000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.866000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.866000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.866000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.866000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.866000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.866000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.866000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.866000 audit: BPF prog-id=185 op=LOAD Dec 13 14:29:26.866000 audit[4480]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000418048 items=0 ppid=4470 pid=4480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:26.866000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037633862643130336137666339363130386332303530343064323832 Dec 13 14:29:26.868631 systemd-resolved[1167]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:29:26.868774 systemd[1]: Started cri-containerd-f129fde6e115e33f88d2a329ce51b61e7afdeb08159d9a537488d772c9dce2f7.scope. Dec 13 14:29:26.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.883000 audit: BPF prog-id=186 op=LOAD Dec 13 14:29:26.884000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.884000 audit[4503]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4064 pid=4503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:26.884000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631323966646536653131356533336638386432613332396365353162 Dec 13 14:29:26.885000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.885000 audit[4503]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4064 pid=4503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:26.885000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631323966646536653131356533336638386432613332396365353162 Dec 13 14:29:26.885000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.885000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.885000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.885000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.885000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.885000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.885000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.885000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.885000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.885000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.885000 audit: BPF prog-id=187 op=LOAD Dec 13 14:29:26.885000 audit[4503]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000284e50 items=0 ppid=4064 pid=4503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:26.885000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631323966646536653131356533336638386432613332396365353162 Dec 13 14:29:26.886000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.886000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.886000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.886000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.886000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.886000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.886000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.886000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.886000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.886000 audit: BPF prog-id=188 op=LOAD Dec 13 14:29:26.886000 audit[4503]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000284e98 items=0 ppid=4064 pid=4503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:26.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631323966646536653131356533336638386432613332396365353162 Dec 13 14:29:26.887000 audit: BPF prog-id=188 op=UNLOAD Dec 13 14:29:26.887000 audit: BPF prog-id=187 op=UNLOAD Dec 13 14:29:26.887000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.887000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.887000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.887000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.887000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.887000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.887000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.887000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.887000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.887000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:26.887000 audit: BPF prog-id=189 op=LOAD Dec 13 14:29:26.887000 audit[4503]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002852a8 items=0 ppid=4064 pid=4503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:26.887000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631323966646536653131356533336638386432613332396365353162 Dec 13 14:29:26.898230 env[1231]: time="2024-12-13T14:29:26.895337819Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-78f4954bf9-7pxmq,Uid:c769c3a1-a661-47f5-890d-b6c9415fb6c6,Namespace:calico-system,Attempt:1,} returns sandbox id \"07c8bd103a7fc96108c205040d282e712bf3cda1cb0e6204acbf77d39816f0ae\"" Dec 13 14:29:26.922998 env[1231]: time="2024-12-13T14:29:26.922915587Z" level=info msg="StartContainer for \"f129fde6e115e33f88d2a329ce51b61e7afdeb08159d9a537488d772c9dce2f7\" returns successfully" Dec 13 14:29:27.076591 kubelet[2075]: E1213 14:29:27.076296 2075 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:29:27.088380 kubelet[2075]: I1213 14:29:27.088300 2075 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6fdbbd74b4-qmlf8" podStartSLOduration=45.555312007 podStartE2EDuration="49.088217332s" podCreationTimestamp="2024-12-13 14:28:38 +0000 UTC" firstStartedPulling="2024-12-13 14:29:23.19002852 +0000 UTC m=+66.378763875" lastFinishedPulling="2024-12-13 14:29:26.722933845 +0000 UTC m=+69.911669200" observedRunningTime="2024-12-13 14:29:27.088002157 +0000 UTC m=+70.276737502" watchObservedRunningTime="2024-12-13 14:29:27.088217332 +0000 UTC m=+70.276952677" Dec 13 14:29:27.386000 audit[4541]: NETFILTER_CFG table=filter:114 family=2 entries=10 op=nft_register_rule pid=4541 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:27.386000 audit[4541]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff44dbd840 a2=0 a3=7fff44dbd82c items=0 ppid=2274 pid=4541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:27.386000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:29:27.389225 systemd-networkd[1047]: cali6ec18d71dc6: Gained IPv6LL Dec 13 14:29:27.402000 audit[4541]: NETFILTER_CFG table=nat:115 family=2 entries=20 op=nft_register_rule pid=4541 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:27.402000 audit[4541]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff44dbd840 a2=0 a3=7fff44dbd82c items=0 ppid=2274 pid=4541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:27.402000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:29:27.901651 env[1231]: time="2024-12-13T14:29:27.901601495Z" level=info msg="StopPodSandbox for \"b0d2329f241ed52341e0e83a277c3646764f348f830084ca33c5b023fec4fbed\"" Dec 13 14:29:27.977321 env[1231]: 2024-12-13 14:29:27.948 [INFO][4558] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b0d2329f241ed52341e0e83a277c3646764f348f830084ca33c5b023fec4fbed" Dec 13 14:29:27.977321 env[1231]: 2024-12-13 14:29:27.948 [INFO][4558] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="b0d2329f241ed52341e0e83a277c3646764f348f830084ca33c5b023fec4fbed" iface="eth0" netns="/var/run/netns/cni-ed2f39d4-f917-6c64-0622-3024cc4d65c8" Dec 13 14:29:27.977321 env[1231]: 2024-12-13 14:29:27.948 [INFO][4558] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="b0d2329f241ed52341e0e83a277c3646764f348f830084ca33c5b023fec4fbed" iface="eth0" netns="/var/run/netns/cni-ed2f39d4-f917-6c64-0622-3024cc4d65c8" Dec 13 14:29:27.977321 env[1231]: 2024-12-13 14:29:27.948 [INFO][4558] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="b0d2329f241ed52341e0e83a277c3646764f348f830084ca33c5b023fec4fbed" iface="eth0" netns="/var/run/netns/cni-ed2f39d4-f917-6c64-0622-3024cc4d65c8" Dec 13 14:29:27.977321 env[1231]: 2024-12-13 14:29:27.948 [INFO][4558] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b0d2329f241ed52341e0e83a277c3646764f348f830084ca33c5b023fec4fbed" Dec 13 14:29:27.977321 env[1231]: 2024-12-13 14:29:27.948 [INFO][4558] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b0d2329f241ed52341e0e83a277c3646764f348f830084ca33c5b023fec4fbed" Dec 13 14:29:27.977321 env[1231]: 2024-12-13 14:29:27.967 [INFO][4565] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b0d2329f241ed52341e0e83a277c3646764f348f830084ca33c5b023fec4fbed" HandleID="k8s-pod-network.b0d2329f241ed52341e0e83a277c3646764f348f830084ca33c5b023fec4fbed" Workload="localhost-k8s-calico--apiserver--6fdbbd74b4--s4mbj-eth0" Dec 13 14:29:27.977321 env[1231]: 2024-12-13 14:29:27.968 [INFO][4565] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:29:27.977321 env[1231]: 2024-12-13 14:29:27.968 [INFO][4565] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:29:27.977321 env[1231]: 2024-12-13 14:29:27.973 [WARNING][4565] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b0d2329f241ed52341e0e83a277c3646764f348f830084ca33c5b023fec4fbed" HandleID="k8s-pod-network.b0d2329f241ed52341e0e83a277c3646764f348f830084ca33c5b023fec4fbed" Workload="localhost-k8s-calico--apiserver--6fdbbd74b4--s4mbj-eth0" Dec 13 14:29:27.977321 env[1231]: 2024-12-13 14:29:27.973 [INFO][4565] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b0d2329f241ed52341e0e83a277c3646764f348f830084ca33c5b023fec4fbed" HandleID="k8s-pod-network.b0d2329f241ed52341e0e83a277c3646764f348f830084ca33c5b023fec4fbed" Workload="localhost-k8s-calico--apiserver--6fdbbd74b4--s4mbj-eth0" Dec 13 14:29:27.977321 env[1231]: 2024-12-13 14:29:27.974 [INFO][4565] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:29:27.977321 env[1231]: 2024-12-13 14:29:27.975 [INFO][4558] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b0d2329f241ed52341e0e83a277c3646764f348f830084ca33c5b023fec4fbed" Dec 13 14:29:27.978273 env[1231]: time="2024-12-13T14:29:27.978220216Z" level=info msg="TearDown network for sandbox \"b0d2329f241ed52341e0e83a277c3646764f348f830084ca33c5b023fec4fbed\" successfully" Dec 13 14:29:27.978366 env[1231]: time="2024-12-13T14:29:27.978274439Z" level=info msg="StopPodSandbox for \"b0d2329f241ed52341e0e83a277c3646764f348f830084ca33c5b023fec4fbed\" returns successfully" Dec 13 14:29:27.978962 env[1231]: time="2024-12-13T14:29:27.978932172Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6fdbbd74b4-s4mbj,Uid:ff87d310-5f73-4992-8cd9-347d96eba088,Namespace:calico-apiserver,Attempt:1,}" Dec 13 14:29:27.980520 systemd[1]: run-netns-cni\x2ded2f39d4\x2df917\x2d6c64\x2d0622\x2d3024cc4d65c8.mount: Deactivated successfully. Dec 13 14:29:28.079395 kubelet[2075]: E1213 14:29:28.078923 2075 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:29:28.097000 audit[4514]: AVC avc: denied { watch } for pid=4514 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_28_59.2039495883/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c128,c721 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c128,c721 tclass=file permissive=0 Dec 13 14:29:28.097000 audit[4514]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00122dae0 a2=fc6 a3=0 items=0 ppid=4064 pid=4514 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c128,c721 key=(null) Dec 13 14:29:28.097000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:29:28.218829 systemd-networkd[1047]: calib2d1795bfdc: Link UP Dec 13 14:29:28.222457 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:29:28.222748 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib2d1795bfdc: link becomes ready Dec 13 14:29:28.222850 systemd-networkd[1047]: calib2d1795bfdc: Gained carrier Dec 13 14:29:28.242120 env[1231]: 2024-12-13 14:29:28.046 [INFO][4573] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--6fdbbd74b4--s4mbj-eth0 calico-apiserver-6fdbbd74b4- calico-apiserver ff87d310-5f73-4992-8cd9-347d96eba088 1092 0 2024-12-13 14:28:38 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6fdbbd74b4 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-6fdbbd74b4-s4mbj eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calib2d1795bfdc [] []}} ContainerID="37a2fc044ceb4effd87754c09c33069a5cf1b5cc7df5cd1894f93c4e4565b521" Namespace="calico-apiserver" Pod="calico-apiserver-6fdbbd74b4-s4mbj" WorkloadEndpoint="localhost-k8s-calico--apiserver--6fdbbd74b4--s4mbj-" Dec 13 14:29:28.242120 env[1231]: 2024-12-13 14:29:28.046 [INFO][4573] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="37a2fc044ceb4effd87754c09c33069a5cf1b5cc7df5cd1894f93c4e4565b521" Namespace="calico-apiserver" Pod="calico-apiserver-6fdbbd74b4-s4mbj" WorkloadEndpoint="localhost-k8s-calico--apiserver--6fdbbd74b4--s4mbj-eth0" Dec 13 14:29:28.242120 env[1231]: 2024-12-13 14:29:28.088 [INFO][4586] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="37a2fc044ceb4effd87754c09c33069a5cf1b5cc7df5cd1894f93c4e4565b521" HandleID="k8s-pod-network.37a2fc044ceb4effd87754c09c33069a5cf1b5cc7df5cd1894f93c4e4565b521" Workload="localhost-k8s-calico--apiserver--6fdbbd74b4--s4mbj-eth0" Dec 13 14:29:28.242120 env[1231]: 2024-12-13 14:29:28.104 [INFO][4586] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="37a2fc044ceb4effd87754c09c33069a5cf1b5cc7df5cd1894f93c4e4565b521" HandleID="k8s-pod-network.37a2fc044ceb4effd87754c09c33069a5cf1b5cc7df5cd1894f93c4e4565b521" Workload="localhost-k8s-calico--apiserver--6fdbbd74b4--s4mbj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002e95a0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-6fdbbd74b4-s4mbj", "timestamp":"2024-12-13 14:29:28.088024178 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:29:28.242120 env[1231]: 2024-12-13 14:29:28.104 [INFO][4586] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:29:28.242120 env[1231]: 2024-12-13 14:29:28.104 [INFO][4586] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:29:28.242120 env[1231]: 2024-12-13 14:29:28.104 [INFO][4586] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 14:29:28.242120 env[1231]: 2024-12-13 14:29:28.106 [INFO][4586] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.37a2fc044ceb4effd87754c09c33069a5cf1b5cc7df5cd1894f93c4e4565b521" host="localhost" Dec 13 14:29:28.242120 env[1231]: 2024-12-13 14:29:28.110 [INFO][4586] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 14:29:28.242120 env[1231]: 2024-12-13 14:29:28.118 [INFO][4586] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 14:29:28.242120 env[1231]: 2024-12-13 14:29:28.159 [INFO][4586] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 14:29:28.242120 env[1231]: 2024-12-13 14:29:28.191 [INFO][4586] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 14:29:28.242120 env[1231]: 2024-12-13 14:29:28.191 [INFO][4586] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.37a2fc044ceb4effd87754c09c33069a5cf1b5cc7df5cd1894f93c4e4565b521" host="localhost" Dec 13 14:29:28.242120 env[1231]: 2024-12-13 14:29:28.195 [INFO][4586] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.37a2fc044ceb4effd87754c09c33069a5cf1b5cc7df5cd1894f93c4e4565b521 Dec 13 14:29:28.242120 env[1231]: 2024-12-13 14:29:28.202 [INFO][4586] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.37a2fc044ceb4effd87754c09c33069a5cf1b5cc7df5cd1894f93c4e4565b521" host="localhost" Dec 13 14:29:28.242120 env[1231]: 2024-12-13 14:29:28.213 [INFO][4586] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.37a2fc044ceb4effd87754c09c33069a5cf1b5cc7df5cd1894f93c4e4565b521" host="localhost" Dec 13 14:29:28.242120 env[1231]: 2024-12-13 14:29:28.213 [INFO][4586] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.37a2fc044ceb4effd87754c09c33069a5cf1b5cc7df5cd1894f93c4e4565b521" host="localhost" Dec 13 14:29:28.242120 env[1231]: 2024-12-13 14:29:28.213 [INFO][4586] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:29:28.242120 env[1231]: 2024-12-13 14:29:28.213 [INFO][4586] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="37a2fc044ceb4effd87754c09c33069a5cf1b5cc7df5cd1894f93c4e4565b521" HandleID="k8s-pod-network.37a2fc044ceb4effd87754c09c33069a5cf1b5cc7df5cd1894f93c4e4565b521" Workload="localhost-k8s-calico--apiserver--6fdbbd74b4--s4mbj-eth0" Dec 13 14:29:28.243183 env[1231]: 2024-12-13 14:29:28.216 [INFO][4573] cni-plugin/k8s.go 386: Populated endpoint ContainerID="37a2fc044ceb4effd87754c09c33069a5cf1b5cc7df5cd1894f93c4e4565b521" Namespace="calico-apiserver" Pod="calico-apiserver-6fdbbd74b4-s4mbj" WorkloadEndpoint="localhost-k8s-calico--apiserver--6fdbbd74b4--s4mbj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6fdbbd74b4--s4mbj-eth0", GenerateName:"calico-apiserver-6fdbbd74b4-", Namespace:"calico-apiserver", SelfLink:"", UID:"ff87d310-5f73-4992-8cd9-347d96eba088", ResourceVersion:"1092", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 28, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6fdbbd74b4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-6fdbbd74b4-s4mbj", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calib2d1795bfdc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:29:28.243183 env[1231]: 2024-12-13 14:29:28.216 [INFO][4573] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.134/32] ContainerID="37a2fc044ceb4effd87754c09c33069a5cf1b5cc7df5cd1894f93c4e4565b521" Namespace="calico-apiserver" Pod="calico-apiserver-6fdbbd74b4-s4mbj" WorkloadEndpoint="localhost-k8s-calico--apiserver--6fdbbd74b4--s4mbj-eth0" Dec 13 14:29:28.243183 env[1231]: 2024-12-13 14:29:28.216 [INFO][4573] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calib2d1795bfdc ContainerID="37a2fc044ceb4effd87754c09c33069a5cf1b5cc7df5cd1894f93c4e4565b521" Namespace="calico-apiserver" Pod="calico-apiserver-6fdbbd74b4-s4mbj" WorkloadEndpoint="localhost-k8s-calico--apiserver--6fdbbd74b4--s4mbj-eth0" Dec 13 14:29:28.243183 env[1231]: 2024-12-13 14:29:28.223 [INFO][4573] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="37a2fc044ceb4effd87754c09c33069a5cf1b5cc7df5cd1894f93c4e4565b521" Namespace="calico-apiserver" Pod="calico-apiserver-6fdbbd74b4-s4mbj" WorkloadEndpoint="localhost-k8s-calico--apiserver--6fdbbd74b4--s4mbj-eth0" Dec 13 14:29:28.243183 env[1231]: 2024-12-13 14:29:28.223 [INFO][4573] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="37a2fc044ceb4effd87754c09c33069a5cf1b5cc7df5cd1894f93c4e4565b521" Namespace="calico-apiserver" Pod="calico-apiserver-6fdbbd74b4-s4mbj" WorkloadEndpoint="localhost-k8s-calico--apiserver--6fdbbd74b4--s4mbj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6fdbbd74b4--s4mbj-eth0", GenerateName:"calico-apiserver-6fdbbd74b4-", Namespace:"calico-apiserver", SelfLink:"", UID:"ff87d310-5f73-4992-8cd9-347d96eba088", ResourceVersion:"1092", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 28, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6fdbbd74b4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"37a2fc044ceb4effd87754c09c33069a5cf1b5cc7df5cd1894f93c4e4565b521", Pod:"calico-apiserver-6fdbbd74b4-s4mbj", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calib2d1795bfdc", MAC:"9e:70:b8:5c:38:cf", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:29:28.243183 env[1231]: 2024-12-13 14:29:28.235 [INFO][4573] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="37a2fc044ceb4effd87754c09c33069a5cf1b5cc7df5cd1894f93c4e4565b521" Namespace="calico-apiserver" Pod="calico-apiserver-6fdbbd74b4-s4mbj" WorkloadEndpoint="localhost-k8s-calico--apiserver--6fdbbd74b4--s4mbj-eth0" Dec 13 14:29:28.248000 audit[4602]: NETFILTER_CFG table=filter:116 family=2 entries=42 op=nft_register_chain pid=4602 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:29:28.248000 audit[4602]: SYSCALL arch=c000003e syscall=46 success=yes exit=22672 a0=3 a1=7fff195f9040 a2=0 a3=7fff195f902c items=0 ppid=3550 pid=4602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:28.248000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:29:28.303505 env[1231]: time="2024-12-13T14:29:28.303422556Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:29:28.303505 env[1231]: time="2024-12-13T14:29:28.303477590Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:29:28.303505 env[1231]: time="2024-12-13T14:29:28.303492457Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:29:28.303771 env[1231]: time="2024-12-13T14:29:28.303720516Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/37a2fc044ceb4effd87754c09c33069a5cf1b5cc7df5cd1894f93c4e4565b521 pid=4615 runtime=io.containerd.runc.v2 Dec 13 14:29:28.320344 systemd[1]: run-containerd-runc-k8s.io-37a2fc044ceb4effd87754c09c33069a5cf1b5cc7df5cd1894f93c4e4565b521-runc.0mP0v7.mount: Deactivated successfully. Dec 13 14:29:28.322039 systemd[1]: Started cri-containerd-37a2fc044ceb4effd87754c09c33069a5cf1b5cc7df5cd1894f93c4e4565b521.scope. Dec 13 14:29:28.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.332000 audit: BPF prog-id=190 op=LOAD Dec 13 14:29:28.333000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.333000 audit[4625]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4615 pid=4625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:28.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337613266633034346365623465666664383737353463303963333330 Dec 13 14:29:28.333000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.333000 audit[4625]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4615 pid=4625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:28.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337613266633034346365623465666664383737353463303963333330 Dec 13 14:29:28.333000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.333000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.333000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.333000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.333000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.333000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.333000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.333000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.333000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.333000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.333000 audit: BPF prog-id=191 op=LOAD Dec 13 14:29:28.333000 audit[4625]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001dddf0 items=0 ppid=4615 pid=4625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:28.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337613266633034346365623465666664383737353463303963333330 Dec 13 14:29:28.333000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.333000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.333000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.333000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.333000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.333000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.333000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.333000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.333000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.333000 audit: BPF prog-id=192 op=LOAD Dec 13 14:29:28.333000 audit[4625]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001dde38 items=0 ppid=4615 pid=4625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:28.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337613266633034346365623465666664383737353463303963333330 Dec 13 14:29:28.333000 audit: BPF prog-id=192 op=UNLOAD Dec 13 14:29:28.333000 audit: BPF prog-id=191 op=UNLOAD Dec 13 14:29:28.333000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.333000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.333000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.333000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.333000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.333000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.333000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.333000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.333000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.333000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.333000 audit: BPF prog-id=193 op=LOAD Dec 13 14:29:28.333000 audit[4625]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c2248 items=0 ppid=4615 pid=4625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:28.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337613266633034346365623465666664383737353463303963333330 Dec 13 14:29:28.335480 systemd-resolved[1167]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:29:28.337346 env[1231]: time="2024-12-13T14:29:28.337280689Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:28.348416 systemd-networkd[1047]: caliaa2c9b93311: Gained IPv6LL Dec 13 14:29:28.358798 env[1231]: time="2024-12-13T14:29:28.358749199Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:28.361409 env[1231]: time="2024-12-13T14:29:28.361382544Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:28.363366 env[1231]: time="2024-12-13T14:29:28.363324620Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6fdbbd74b4-s4mbj,Uid:ff87d310-5f73-4992-8cd9-347d96eba088,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"37a2fc044ceb4effd87754c09c33069a5cf1b5cc7df5cd1894f93c4e4565b521\"" Dec 13 14:29:28.364405 env[1231]: time="2024-12-13T14:29:28.364383939Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:28.364718 env[1231]: time="2024-12-13T14:29:28.364666550Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 14:29:28.366041 env[1231]: time="2024-12-13T14:29:28.366010734Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 13 14:29:28.366813 env[1231]: time="2024-12-13T14:29:28.366779848Z" level=info msg="CreateContainer within sandbox \"37a2fc044ceb4effd87754c09c33069a5cf1b5cc7df5cd1894f93c4e4565b521\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 14:29:28.368986 env[1231]: time="2024-12-13T14:29:28.368939262Z" level=info msg="CreateContainer within sandbox \"40852c40fe879aab30929551dc64574e39f9d3c31bf9a908eac766e845bd4b98\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 14:29:28.396355 env[1231]: time="2024-12-13T14:29:28.396222811Z" level=info msg="CreateContainer within sandbox \"37a2fc044ceb4effd87754c09c33069a5cf1b5cc7df5cd1894f93c4e4565b521\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"a3cac15cdf15a0e38a69e0ad720991a9a4c419b4d0a58336253b21c04136a643\"" Dec 13 14:29:28.397140 env[1231]: time="2024-12-13T14:29:28.397065643Z" level=info msg="StartContainer for \"a3cac15cdf15a0e38a69e0ad720991a9a4c419b4d0a58336253b21c04136a643\"" Dec 13 14:29:28.406601 env[1231]: time="2024-12-13T14:29:28.406548779Z" level=info msg="CreateContainer within sandbox \"40852c40fe879aab30929551dc64574e39f9d3c31bf9a908eac766e845bd4b98\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"ead77c46a326e6e20b6b13b91c5640df4c5bb72b7bda3f296d6200854b50ded7\"" Dec 13 14:29:28.407372 env[1231]: time="2024-12-13T14:29:28.407321000Z" level=info msg="StartContainer for \"ead77c46a326e6e20b6b13b91c5640df4c5bb72b7bda3f296d6200854b50ded7\"" Dec 13 14:29:28.419605 systemd[1]: Started cri-containerd-a3cac15cdf15a0e38a69e0ad720991a9a4c419b4d0a58336253b21c04136a643.scope. Dec 13 14:29:28.421000 audit[4682]: NETFILTER_CFG table=filter:117 family=2 entries=9 op=nft_register_rule pid=4682 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:28.421000 audit[4682]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffcf659f1d0 a2=0 a3=7ffcf659f1bc items=0 ppid=2274 pid=4682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:28.421000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:29:28.435029 systemd[1]: Started cri-containerd-ead77c46a326e6e20b6b13b91c5640df4c5bb72b7bda3f296d6200854b50ded7.scope. Dec 13 14:29:28.433000 audit[4682]: NETFILTER_CFG table=nat:118 family=2 entries=27 op=nft_register_chain pid=4682 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:28.433000 audit[4682]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffcf659f1d0 a2=0 a3=7ffcf659f1bc items=0 ppid=2274 pid=4682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:28.433000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:29:28.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.439000 audit: BPF prog-id=194 op=LOAD Dec 13 14:29:28.440000 audit[4657]: AVC avc: denied { bpf } for pid=4657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.440000 audit[4657]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4615 pid=4657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:28.440000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133636163313563646631356130653338613639653061643732303939 Dec 13 14:29:28.440000 audit[4657]: AVC avc: denied { perfmon } for pid=4657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.440000 audit[4657]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4615 pid=4657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:28.440000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133636163313563646631356130653338613639653061643732303939 Dec 13 14:29:28.440000 audit[4657]: AVC avc: denied { bpf } for pid=4657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.440000 audit[4657]: AVC avc: denied { bpf } for pid=4657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.440000 audit[4657]: AVC avc: denied { bpf } for pid=4657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.440000 audit[4657]: AVC avc: denied { perfmon } for pid=4657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.440000 audit[4657]: AVC avc: denied { perfmon } for pid=4657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.440000 audit[4657]: AVC avc: denied { perfmon } for pid=4657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.440000 audit[4657]: AVC avc: denied { perfmon } for pid=4657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.440000 audit[4657]: AVC avc: denied { perfmon } for pid=4657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.440000 audit[4657]: AVC avc: denied { bpf } for pid=4657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.440000 audit[4657]: AVC avc: denied { bpf } for pid=4657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.440000 audit: BPF prog-id=195 op=LOAD Dec 13 14:29:28.440000 audit[4657]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000284810 items=0 ppid=4615 pid=4657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:28.440000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133636163313563646631356130653338613639653061643732303939 Dec 13 14:29:28.441000 audit[4657]: AVC avc: denied { bpf } for pid=4657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.441000 audit[4657]: AVC avc: denied { bpf } for pid=4657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.441000 audit[4657]: AVC avc: denied { perfmon } for pid=4657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.441000 audit[4657]: AVC avc: denied { perfmon } for pid=4657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.441000 audit[4657]: AVC avc: denied { perfmon } for pid=4657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.441000 audit[4657]: AVC avc: denied { perfmon } for pid=4657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.441000 audit[4657]: AVC avc: denied { perfmon } for pid=4657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.441000 audit[4657]: AVC avc: denied { bpf } for pid=4657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.441000 audit[4657]: AVC avc: denied { bpf } for pid=4657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.441000 audit: BPF prog-id=196 op=LOAD Dec 13 14:29:28.441000 audit[4657]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000284858 items=0 ppid=4615 pid=4657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:28.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133636163313563646631356130653338613639653061643732303939 Dec 13 14:29:28.442000 audit: BPF prog-id=196 op=UNLOAD Dec 13 14:29:28.442000 audit: BPF prog-id=195 op=UNLOAD Dec 13 14:29:28.442000 audit[4657]: AVC avc: denied { bpf } for pid=4657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.442000 audit[4657]: AVC avc: denied { bpf } for pid=4657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.442000 audit[4657]: AVC avc: denied { bpf } for pid=4657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.442000 audit[4657]: AVC avc: denied { perfmon } for pid=4657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.442000 audit[4657]: AVC avc: denied { perfmon } for pid=4657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.442000 audit[4657]: AVC avc: denied { perfmon } for pid=4657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.442000 audit[4657]: AVC avc: denied { perfmon } for pid=4657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.442000 audit[4657]: AVC avc: denied { perfmon } for pid=4657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.442000 audit[4657]: AVC avc: denied { bpf } for pid=4657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.442000 audit[4657]: AVC avc: denied { bpf } for pid=4657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.442000 audit: BPF prog-id=197 op=LOAD Dec 13 14:29:28.442000 audit[4657]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000284c68 items=0 ppid=4615 pid=4657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:28.442000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133636163313563646631356130653338613639653061643732303939 Dec 13 14:29:28.448000 audit[4674]: AVC avc: denied { perfmon } for pid=4674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.448000 audit[4674]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fe121422898 items=0 ppid=4310 pid=4674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:28.448000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561643737633436613332366536653230623662313362393163353634 Dec 13 14:29:28.448000 audit[4674]: AVC avc: denied { bpf } for pid=4674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.448000 audit[4674]: AVC avc: denied { bpf } for pid=4674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.448000 audit[4674]: AVC avc: denied { bpf } for pid=4674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.448000 audit[4674]: AVC avc: denied { perfmon } for pid=4674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.448000 audit[4674]: AVC avc: denied { perfmon } for pid=4674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.448000 audit[4674]: AVC avc: denied { perfmon } for pid=4674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.448000 audit[4674]: AVC avc: denied { perfmon } for pid=4674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.448000 audit[4674]: AVC avc: denied { perfmon } for pid=4674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.448000 audit[4674]: AVC avc: denied { bpf } for pid=4674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.448000 audit[4674]: AVC avc: denied { bpf } for pid=4674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.448000 audit: BPF prog-id=198 op=LOAD Dec 13 14:29:28.448000 audit[4674]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00037c388 items=0 ppid=4310 pid=4674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:28.448000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561643737633436613332366536653230623662313362393163353634 Dec 13 14:29:28.448000 audit[4674]: AVC avc: denied { bpf } for pid=4674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.448000 audit[4674]: AVC avc: denied { bpf } for pid=4674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.448000 audit[4674]: AVC avc: denied { perfmon } for pid=4674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.448000 audit[4674]: AVC avc: denied { perfmon } for pid=4674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.448000 audit[4674]: AVC avc: denied { perfmon } for pid=4674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.448000 audit[4674]: AVC avc: denied { perfmon } for pid=4674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.448000 audit[4674]: AVC avc: denied { perfmon } for pid=4674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.448000 audit[4674]: AVC avc: denied { bpf } for pid=4674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.448000 audit[4674]: AVC avc: denied { bpf } for pid=4674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.448000 audit: BPF prog-id=199 op=LOAD Dec 13 14:29:28.448000 audit[4674]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00037c3d8 items=0 ppid=4310 pid=4674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:28.448000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561643737633436613332366536653230623662313362393163353634 Dec 13 14:29:28.450000 audit: BPF prog-id=199 op=UNLOAD Dec 13 14:29:28.450000 audit: BPF prog-id=198 op=UNLOAD Dec 13 14:29:28.450000 audit[4674]: AVC avc: denied { bpf } for pid=4674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.450000 audit[4674]: AVC avc: denied { bpf } for pid=4674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.450000 audit[4674]: AVC avc: denied { bpf } for pid=4674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.450000 audit[4674]: AVC avc: denied { perfmon } for pid=4674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.450000 audit[4674]: AVC avc: denied { perfmon } for pid=4674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.450000 audit[4674]: AVC avc: denied { perfmon } for pid=4674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.450000 audit[4674]: AVC avc: denied { perfmon } for pid=4674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.450000 audit[4674]: AVC avc: denied { perfmon } for pid=4674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.450000 audit[4674]: AVC avc: denied { bpf } for pid=4674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.450000 audit[4674]: AVC avc: denied { bpf } for pid=4674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:28.450000 audit: BPF prog-id=200 op=LOAD Dec 13 14:29:28.450000 audit[4674]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00037c468 items=0 ppid=4310 pid=4674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:28.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561643737633436613332366536653230623662313362393163353634 Dec 13 14:29:28.494144 env[1231]: time="2024-12-13T14:29:28.493931372Z" level=info msg="StartContainer for \"ead77c46a326e6e20b6b13b91c5640df4c5bb72b7bda3f296d6200854b50ded7\" returns successfully" Dec 13 14:29:28.495313 env[1231]: time="2024-12-13T14:29:28.495009385Z" level=info msg="StartContainer for \"a3cac15cdf15a0e38a69e0ad720991a9a4c419b4d0a58336253b21c04136a643\" returns successfully" Dec 13 14:29:29.308421 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3399227304.mount: Deactivated successfully. Dec 13 14:29:29.447000 audit[4728]: NETFILTER_CFG table=filter:119 family=2 entries=8 op=nft_register_rule pid=4728 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:29.447000 audit[4728]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd1575e120 a2=0 a3=7ffd1575e10c items=0 ppid=2274 pid=4728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:29.447000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:29:29.455000 audit[4728]: NETFILTER_CFG table=nat:120 family=2 entries=30 op=nft_register_rule pid=4728 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:29.455000 audit[4728]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffd1575e120 a2=0 a3=7ffd1575e10c items=0 ppid=2274 pid=4728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:29.455000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:29:29.607000 audit[4687]: AVC avc: denied { watch } for pid=4687 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_28_59.1919479842/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c450,c620 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c450,c620 tclass=file permissive=0 Dec 13 14:29:29.607000 audit[4687]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0005ffac0 a2=fc6 a3=0 items=0 ppid=4615 pid=4687 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c450,c620 key=(null) Dec 13 14:29:29.607000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:29:29.623792 kubelet[2075]: I1213 14:29:29.623732 2075 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6fdbbd74b4-s4mbj" podStartSLOduration=51.623678415 podStartE2EDuration="51.623678415s" podCreationTimestamp="2024-12-13 14:28:38 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:29:29.101771999 +0000 UTC m=+72.290507364" watchObservedRunningTime="2024-12-13 14:29:29.623678415 +0000 UTC m=+72.812413780" Dec 13 14:29:30.268379 systemd-networkd[1047]: calib2d1795bfdc: Gained IPv6LL Dec 13 14:29:30.339104 kernel: kauditd_printk_skb: 503 callbacks suppressed Dec 13 14:29:30.339241 kernel: audit: type=1130 audit(1734100170.331:1411): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.112:22-10.0.0.1:36922 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:30.331000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.112:22-10.0.0.1:36922 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:30.332694 systemd[1]: Started sshd@17-10.0.0.112:22-10.0.0.1:36922.service. Dec 13 14:29:30.369000 audit[4730]: USER_ACCT pid=4730 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:30.375288 kernel: audit: type=1101 audit(1734100170.369:1412): pid=4730 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:30.375334 sshd[4730]: Accepted publickey for core from 10.0.0.1 port 36922 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:29:30.375801 sshd[4730]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:29:30.374000 audit[4730]: CRED_ACQ pid=4730 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:30.384091 kernel: audit: type=1103 audit(1734100170.374:1413): pid=4730 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:30.384177 kernel: audit: type=1006 audit(1734100170.374:1414): pid=4730 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Dec 13 14:29:30.374000 audit[4730]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe28ece80 a2=3 a3=0 items=0 ppid=1 pid=4730 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:30.388985 kernel: audit: type=1300 audit(1734100170.374:1414): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe28ece80 a2=3 a3=0 items=0 ppid=1 pid=4730 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:30.389053 kernel: audit: type=1327 audit(1734100170.374:1414): proctitle=737368643A20636F7265205B707269765D Dec 13 14:29:30.374000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:29:30.391186 systemd-logind[1219]: New session 18 of user core. Dec 13 14:29:30.391783 systemd[1]: Started session-18.scope. Dec 13 14:29:30.395000 audit[4730]: USER_START pid=4730 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:30.405719 kernel: audit: type=1105 audit(1734100170.395:1415): pid=4730 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:30.405855 kernel: audit: type=1103 audit(1734100170.400:1416): pid=4732 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:30.400000 audit[4732]: CRED_ACQ pid=4732 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:30.494888 kernel: audit: type=1325 audit(1734100170.485:1417): table=filter:121 family=2 entries=8 op=nft_register_rule pid=4742 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:30.495045 kernel: audit: type=1300 audit(1734100170.485:1417): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffcae4a2b30 a2=0 a3=7ffcae4a2b1c items=0 ppid=2274 pid=4742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:30.485000 audit[4742]: NETFILTER_CFG table=filter:121 family=2 entries=8 op=nft_register_rule pid=4742 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:30.485000 audit[4742]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffcae4a2b30 a2=0 a3=7ffcae4a2b1c items=0 ppid=2274 pid=4742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:30.485000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:29:30.498000 audit[4742]: NETFILTER_CFG table=nat:122 family=2 entries=34 op=nft_register_chain pid=4742 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:30.498000 audit[4742]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffcae4a2b30 a2=0 a3=7ffcae4a2b1c items=0 ppid=2274 pid=4742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:30.498000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:29:30.526470 sshd[4730]: pam_unix(sshd:session): session closed for user core Dec 13 14:29:30.526000 audit[4730]: USER_END pid=4730 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:30.526000 audit[4730]: CRED_DISP pid=4730 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:30.529654 systemd[1]: sshd@17-10.0.0.112:22-10.0.0.1:36922.service: Deactivated successfully. Dec 13 14:29:30.530595 systemd[1]: session-18.scope: Deactivated successfully. Dec 13 14:29:30.528000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.112:22-10.0.0.1:36922 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:30.531368 systemd-logind[1219]: Session 18 logged out. Waiting for processes to exit. Dec 13 14:29:30.532340 systemd-logind[1219]: Removed session 18. Dec 13 14:29:30.987581 env[1231]: time="2024-12-13T14:29:30.987512584Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:30.990355 env[1231]: time="2024-12-13T14:29:30.990311566Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:30.992239 env[1231]: time="2024-12-13T14:29:30.992206820Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:30.994239 env[1231]: time="2024-12-13T14:29:30.994194366Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:30.994707 env[1231]: time="2024-12-13T14:29:30.994672605Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da\"" Dec 13 14:29:30.995325 env[1231]: time="2024-12-13T14:29:30.995279146Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 14:29:31.002248 env[1231]: time="2024-12-13T14:29:31.002197394Z" level=info msg="CreateContainer within sandbox \"07c8bd103a7fc96108c205040d282e712bf3cda1cb0e6204acbf77d39816f0ae\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 14:29:31.021695 env[1231]: time="2024-12-13T14:29:31.021644821Z" level=info msg="CreateContainer within sandbox \"07c8bd103a7fc96108c205040d282e712bf3cda1cb0e6204acbf77d39816f0ae\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"9d17db13681109d7a53432ae6c5ce7df9431e764fa7cf5edf067cf2c64186bde\"" Dec 13 14:29:31.022349 env[1231]: time="2024-12-13T14:29:31.022313018Z" level=info msg="StartContainer for \"9d17db13681109d7a53432ae6c5ce7df9431e764fa7cf5edf067cf2c64186bde\"" Dec 13 14:29:31.039505 systemd[1]: Started cri-containerd-9d17db13681109d7a53432ae6c5ce7df9431e764fa7cf5edf067cf2c64186bde.scope. Dec 13 14:29:31.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:31.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:31.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:31.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:31.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:31.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:31.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:31.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:31.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:31.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:31.052000 audit: BPF prog-id=201 op=LOAD Dec 13 14:29:31.053000 audit[4753]: AVC avc: denied { bpf } for pid=4753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:31.053000 audit[4753]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4470 pid=4753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:31.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964313764623133363831313039643761353334333261653663356365 Dec 13 14:29:31.053000 audit[4753]: AVC avc: denied { perfmon } for pid=4753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:31.053000 audit[4753]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4470 pid=4753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:31.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964313764623133363831313039643761353334333261653663356365 Dec 13 14:29:31.053000 audit[4753]: AVC avc: denied { bpf } for pid=4753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:31.053000 audit[4753]: AVC avc: denied { bpf } for pid=4753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:31.053000 audit[4753]: AVC avc: denied { bpf } for pid=4753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:31.053000 audit[4753]: AVC avc: denied { perfmon } for pid=4753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:31.053000 audit[4753]: AVC avc: denied { perfmon } for pid=4753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:31.053000 audit[4753]: AVC avc: denied { perfmon } for pid=4753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:31.053000 audit[4753]: AVC avc: denied { perfmon } for pid=4753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:31.053000 audit[4753]: AVC avc: denied { perfmon } for pid=4753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:31.053000 audit[4753]: AVC avc: denied { bpf } for pid=4753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:31.053000 audit[4753]: AVC avc: denied { bpf } for pid=4753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:31.053000 audit: BPF prog-id=202 op=LOAD Dec 13 14:29:31.053000 audit[4753]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000024cd0 items=0 ppid=4470 pid=4753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:31.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964313764623133363831313039643761353334333261653663356365 Dec 13 14:29:31.053000 audit[4753]: AVC avc: denied { bpf } for pid=4753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:31.053000 audit[4753]: AVC avc: denied { bpf } for pid=4753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:31.053000 audit[4753]: AVC avc: denied { perfmon } for pid=4753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:31.053000 audit[4753]: AVC avc: denied { perfmon } for pid=4753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:31.053000 audit[4753]: AVC avc: denied { perfmon } for pid=4753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:31.053000 audit[4753]: AVC avc: denied { perfmon } for pid=4753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:31.053000 audit[4753]: AVC avc: denied { perfmon } for pid=4753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:31.053000 audit[4753]: AVC avc: denied { bpf } for pid=4753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:31.053000 audit[4753]: AVC avc: denied { bpf } for pid=4753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:31.053000 audit: BPF prog-id=203 op=LOAD Dec 13 14:29:31.053000 audit[4753]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000024d18 items=0 ppid=4470 pid=4753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:31.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964313764623133363831313039643761353334333261653663356365 Dec 13 14:29:31.053000 audit: BPF prog-id=203 op=UNLOAD Dec 13 14:29:31.053000 audit: BPF prog-id=202 op=UNLOAD Dec 13 14:29:31.053000 audit[4753]: AVC avc: denied { bpf } for pid=4753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:31.053000 audit[4753]: AVC avc: denied { bpf } for pid=4753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:31.053000 audit[4753]: AVC avc: denied { bpf } for pid=4753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:31.053000 audit[4753]: AVC avc: denied { perfmon } for pid=4753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:31.053000 audit[4753]: AVC avc: denied { perfmon } for pid=4753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:31.053000 audit[4753]: AVC avc: denied { perfmon } for pid=4753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:31.053000 audit[4753]: AVC avc: denied { perfmon } for pid=4753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:31.053000 audit[4753]: AVC avc: denied { perfmon } for pid=4753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:31.053000 audit[4753]: AVC avc: denied { bpf } for pid=4753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:31.053000 audit[4753]: AVC avc: denied { bpf } for pid=4753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:31.053000 audit: BPF prog-id=204 op=LOAD Dec 13 14:29:31.053000 audit[4753]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000025128 items=0 ppid=4470 pid=4753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:31.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964313764623133363831313039643761353334333261653663356365 Dec 13 14:29:31.393766 env[1231]: time="2024-12-13T14:29:31.393603950Z" level=info msg="StartContainer for \"9d17db13681109d7a53432ae6c5ce7df9431e764fa7cf5edf067cf2c64186bde\" returns successfully" Dec 13 14:29:31.450749 kubelet[2075]: I1213 14:29:31.450699 2075 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-78f4954bf9-7pxmq" podStartSLOduration=49.352092961 podStartE2EDuration="53.450654579s" podCreationTimestamp="2024-12-13 14:28:38 +0000 UTC" firstStartedPulling="2024-12-13 14:29:26.896436209 +0000 UTC m=+70.085171564" lastFinishedPulling="2024-12-13 14:29:30.994997827 +0000 UTC m=+74.183733182" observedRunningTime="2024-12-13 14:29:31.409204539 +0000 UTC m=+74.597939894" watchObservedRunningTime="2024-12-13 14:29:31.450654579 +0000 UTC m=+74.639389934" Dec 13 14:29:31.901907 kubelet[2075]: E1213 14:29:31.901860 2075 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:29:32.523961 env[1231]: time="2024-12-13T14:29:32.523884853Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:32.526147 env[1231]: time="2024-12-13T14:29:32.526109521Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:32.527957 env[1231]: time="2024-12-13T14:29:32.527906523Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:32.530281 env[1231]: time="2024-12-13T14:29:32.530228054Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:32.530708 env[1231]: time="2024-12-13T14:29:32.530659796Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 14:29:32.532822 env[1231]: time="2024-12-13T14:29:32.532776381Z" level=info msg="CreateContainer within sandbox \"40852c40fe879aab30929551dc64574e39f9d3c31bf9a908eac766e845bd4b98\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 14:29:32.549714 env[1231]: time="2024-12-13T14:29:32.549365539Z" level=info msg="CreateContainer within sandbox \"40852c40fe879aab30929551dc64574e39f9d3c31bf9a908eac766e845bd4b98\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"6d20a557f38feb953408ebd71b4014f2b785c5cfd3ea2a5d4bf5d306752e8530\"" Dec 13 14:29:32.550873 env[1231]: time="2024-12-13T14:29:32.550185713Z" level=info msg="StartContainer for \"6d20a557f38feb953408ebd71b4014f2b785c5cfd3ea2a5d4bf5d306752e8530\"" Dec 13 14:29:32.577391 systemd[1]: Started cri-containerd-6d20a557f38feb953408ebd71b4014f2b785c5cfd3ea2a5d4bf5d306752e8530.scope. Dec 13 14:29:32.593000 audit[4812]: AVC avc: denied { perfmon } for pid=4812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:32.593000 audit[4812]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f558226da48 items=0 ppid=4310 pid=4812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:32.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664323061353537663338666562393533343038656264373162343031 Dec 13 14:29:32.593000 audit[4812]: AVC avc: denied { bpf } for pid=4812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:32.593000 audit[4812]: AVC avc: denied { bpf } for pid=4812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:32.593000 audit[4812]: AVC avc: denied { bpf } for pid=4812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:32.593000 audit[4812]: AVC avc: denied { perfmon } for pid=4812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:32.593000 audit[4812]: AVC avc: denied { perfmon } for pid=4812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:32.593000 audit[4812]: AVC avc: denied { perfmon } for pid=4812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:32.593000 audit[4812]: AVC avc: denied { perfmon } for pid=4812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:32.593000 audit[4812]: AVC avc: denied { perfmon } for pid=4812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:32.593000 audit[4812]: AVC avc: denied { bpf } for pid=4812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:32.593000 audit[4812]: AVC avc: denied { bpf } for pid=4812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:32.593000 audit: BPF prog-id=205 op=LOAD Dec 13 14:29:32.593000 audit[4812]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003de348 items=0 ppid=4310 pid=4812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:32.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664323061353537663338666562393533343038656264373162343031 Dec 13 14:29:32.593000 audit[4812]: AVC avc: denied { bpf } for pid=4812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:32.593000 audit[4812]: AVC avc: denied { bpf } for pid=4812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:32.593000 audit[4812]: AVC avc: denied { perfmon } for pid=4812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:32.593000 audit[4812]: AVC avc: denied { perfmon } for pid=4812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:32.593000 audit[4812]: AVC avc: denied { perfmon } for pid=4812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:32.593000 audit[4812]: AVC avc: denied { perfmon } for pid=4812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:32.593000 audit[4812]: AVC avc: denied { perfmon } for pid=4812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:32.593000 audit[4812]: AVC avc: denied { bpf } for pid=4812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:32.593000 audit[4812]: AVC avc: denied { bpf } for pid=4812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:32.593000 audit: BPF prog-id=206 op=LOAD Dec 13 14:29:32.593000 audit[4812]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003de398 items=0 ppid=4310 pid=4812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:32.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664323061353537663338666562393533343038656264373162343031 Dec 13 14:29:32.593000 audit: BPF prog-id=206 op=UNLOAD Dec 13 14:29:32.593000 audit: BPF prog-id=205 op=UNLOAD Dec 13 14:29:32.593000 audit[4812]: AVC avc: denied { bpf } for pid=4812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:32.593000 audit[4812]: AVC avc: denied { bpf } for pid=4812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:32.593000 audit[4812]: AVC avc: denied { bpf } for pid=4812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:32.593000 audit[4812]: AVC avc: denied { perfmon } for pid=4812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:32.593000 audit[4812]: AVC avc: denied { perfmon } for pid=4812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:32.593000 audit[4812]: AVC avc: denied { perfmon } for pid=4812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:32.593000 audit[4812]: AVC avc: denied { perfmon } for pid=4812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:32.593000 audit[4812]: AVC avc: denied { perfmon } for pid=4812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:32.593000 audit[4812]: AVC avc: denied { bpf } for pid=4812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:32.593000 audit[4812]: AVC avc: denied { bpf } for pid=4812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:29:32.593000 audit: BPF prog-id=207 op=LOAD Dec 13 14:29:32.593000 audit[4812]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003de428 items=0 ppid=4310 pid=4812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:32.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664323061353537663338666562393533343038656264373162343031 Dec 13 14:29:32.609877 env[1231]: time="2024-12-13T14:29:32.609801928Z" level=info msg="StartContainer for \"6d20a557f38feb953408ebd71b4014f2b785c5cfd3ea2a5d4bf5d306752e8530\" returns successfully" Dec 13 14:29:32.969241 kubelet[2075]: I1213 14:29:32.969182 2075 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 14:29:32.970439 kubelet[2075]: I1213 14:29:32.970417 2075 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 14:29:33.001705 systemd[1]: run-containerd-runc-k8s.io-6d20a557f38feb953408ebd71b4014f2b785c5cfd3ea2a5d4bf5d306752e8530-runc.2uIpO3.mount: Deactivated successfully. Dec 13 14:29:33.412727 kubelet[2075]: I1213 14:29:33.412671 2075 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-tstdc" podStartSLOduration=48.470716683 podStartE2EDuration="55.412636916s" podCreationTimestamp="2024-12-13 14:28:38 +0000 UTC" firstStartedPulling="2024-12-13 14:29:25.589117315 +0000 UTC m=+68.777852670" lastFinishedPulling="2024-12-13 14:29:32.531037558 +0000 UTC m=+75.719772903" observedRunningTime="2024-12-13 14:29:33.412236612 +0000 UTC m=+76.600971967" watchObservedRunningTime="2024-12-13 14:29:33.412636916 +0000 UTC m=+76.601372271" Dec 13 14:29:34.901259 kubelet[2075]: E1213 14:29:34.901207 2075 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:29:35.531027 systemd[1]: Started sshd@18-10.0.0.112:22-10.0.0.1:36936.service. Dec 13 14:29:35.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.112:22-10.0.0.1:36936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:35.532759 kernel: kauditd_printk_skb: 107 callbacks suppressed Dec 13 14:29:35.532911 kernel: audit: type=1130 audit(1734100175.530:1446): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.112:22-10.0.0.1:36936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:35.568000 audit[4852]: USER_ACCT pid=4852 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:35.569903 sshd[4852]: Accepted publickey for core from 10.0.0.1 port 36936 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:29:35.573093 sshd[4852]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:29:35.571000 audit[4852]: CRED_ACQ pid=4852 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:35.577620 kernel: audit: type=1101 audit(1734100175.568:1447): pid=4852 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:35.577690 kernel: audit: type=1103 audit(1734100175.571:1448): pid=4852 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:35.577724 kernel: audit: type=1006 audit(1734100175.571:1449): pid=4852 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Dec 13 14:29:35.579379 systemd-logind[1219]: New session 19 of user core. Dec 13 14:29:35.579974 kernel: audit: type=1300 audit(1734100175.571:1449): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe951f83e0 a2=3 a3=0 items=0 ppid=1 pid=4852 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:35.571000 audit[4852]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe951f83e0 a2=3 a3=0 items=0 ppid=1 pid=4852 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:35.580890 systemd[1]: Started session-19.scope. Dec 13 14:29:35.584109 kernel: audit: type=1327 audit(1734100175.571:1449): proctitle=737368643A20636F7265205B707269765D Dec 13 14:29:35.571000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:29:35.586000 audit[4852]: USER_START pid=4852 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:35.588000 audit[4854]: CRED_ACQ pid=4854 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:35.595268 kernel: audit: type=1105 audit(1734100175.586:1450): pid=4852 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:35.595378 kernel: audit: type=1103 audit(1734100175.588:1451): pid=4854 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:35.716062 sshd[4852]: pam_unix(sshd:session): session closed for user core Dec 13 14:29:35.716000 audit[4852]: USER_END pid=4852 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:35.722141 kernel: audit: type=1106 audit(1734100175.716:1452): pid=4852 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:35.721000 audit[4852]: CRED_DISP pid=4852 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:35.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.112:22-10.0.0.1:36950 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:35.725965 systemd[1]: Started sshd@19-10.0.0.112:22-10.0.0.1:36950.service. Dec 13 14:29:35.727197 kernel: audit: type=1104 audit(1734100175.721:1453): pid=4852 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:35.726000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.112:22-10.0.0.1:36936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:35.726748 systemd[1]: sshd@18-10.0.0.112:22-10.0.0.1:36936.service: Deactivated successfully. Dec 13 14:29:35.727943 systemd[1]: session-19.scope: Deactivated successfully. Dec 13 14:29:35.728741 systemd-logind[1219]: Session 19 logged out. Waiting for processes to exit. Dec 13 14:29:35.729951 systemd-logind[1219]: Removed session 19. Dec 13 14:29:35.760000 audit[4864]: USER_ACCT pid=4864 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:35.762223 sshd[4864]: Accepted publickey for core from 10.0.0.1 port 36950 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:29:35.761000 audit[4864]: CRED_ACQ pid=4864 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:35.762000 audit[4864]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff56f84170 a2=3 a3=0 items=0 ppid=1 pid=4864 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:35.762000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:29:35.763526 sshd[4864]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:29:35.767801 systemd-logind[1219]: New session 20 of user core. Dec 13 14:29:35.768860 systemd[1]: Started session-20.scope. Dec 13 14:29:35.773000 audit[4864]: USER_START pid=4864 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:35.774000 audit[4867]: CRED_ACQ pid=4867 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:36.234696 sshd[4864]: pam_unix(sshd:session): session closed for user core Dec 13 14:29:36.234000 audit[4864]: USER_END pid=4864 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:36.235000 audit[4864]: CRED_DISP pid=4864 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:36.238910 systemd[1]: Started sshd@20-10.0.0.112:22-10.0.0.1:36956.service. Dec 13 14:29:36.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.112:22-10.0.0.1:36956 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:36.239555 systemd[1]: sshd@19-10.0.0.112:22-10.0.0.1:36950.service: Deactivated successfully. Dec 13 14:29:36.238000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.112:22-10.0.0.1:36950 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:36.240175 systemd[1]: session-20.scope: Deactivated successfully. Dec 13 14:29:36.240823 systemd-logind[1219]: Session 20 logged out. Waiting for processes to exit. Dec 13 14:29:36.241890 systemd-logind[1219]: Removed session 20. Dec 13 14:29:36.271000 audit[4875]: USER_ACCT pid=4875 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:36.272940 sshd[4875]: Accepted publickey for core from 10.0.0.1 port 36956 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:29:36.273000 audit[4875]: CRED_ACQ pid=4875 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:36.273000 audit[4875]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd04b73de0 a2=3 a3=0 items=0 ppid=1 pid=4875 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:36.273000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:29:36.274792 sshd[4875]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:29:36.279307 systemd-logind[1219]: New session 21 of user core. Dec 13 14:29:36.280345 systemd[1]: Started session-21.scope. Dec 13 14:29:36.285000 audit[4875]: USER_START pid=4875 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:36.287000 audit[4878]: CRED_ACQ pid=4878 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:38.034000 audit[4892]: NETFILTER_CFG table=filter:123 family=2 entries=20 op=nft_register_rule pid=4892 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:38.034000 audit[4892]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffce680a920 a2=0 a3=7ffce680a90c items=0 ppid=2274 pid=4892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:38.034000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:29:38.040000 audit[4892]: NETFILTER_CFG table=nat:124 family=2 entries=22 op=nft_register_rule pid=4892 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:38.040000 audit[4892]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffce680a920 a2=0 a3=0 items=0 ppid=2274 pid=4892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:38.040000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:29:38.046827 sshd[4875]: pam_unix(sshd:session): session closed for user core Dec 13 14:29:38.047000 audit[4875]: USER_END pid=4875 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:38.047000 audit[4875]: CRED_DISP pid=4875 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:38.052429 systemd[1]: sshd@20-10.0.0.112:22-10.0.0.1:36956.service: Deactivated successfully. Dec 13 14:29:38.051000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.112:22-10.0.0.1:36956 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:38.053599 systemd[1]: session-21.scope: Deactivated successfully. Dec 13 14:29:38.054360 systemd-logind[1219]: Session 21 logged out. Waiting for processes to exit. Dec 13 14:29:38.056037 systemd[1]: Started sshd@21-10.0.0.112:22-10.0.0.1:46914.service. Dec 13 14:29:38.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.112:22-10.0.0.1:46914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:38.056000 audit[4896]: NETFILTER_CFG table=filter:125 family=2 entries=32 op=nft_register_rule pid=4896 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:38.056000 audit[4896]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffff0977920 a2=0 a3=7ffff097790c items=0 ppid=2274 pid=4896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:38.056000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:29:38.058059 systemd-logind[1219]: Removed session 21. Dec 13 14:29:38.061000 audit[4896]: NETFILTER_CFG table=nat:126 family=2 entries=22 op=nft_register_rule pid=4896 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:38.061000 audit[4896]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffff0977920 a2=0 a3=0 items=0 ppid=2274 pid=4896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:38.061000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:29:38.086000 audit[4897]: USER_ACCT pid=4897 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:38.088467 sshd[4897]: Accepted publickey for core from 10.0.0.1 port 46914 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:29:38.087000 audit[4897]: CRED_ACQ pid=4897 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:38.087000 audit[4897]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda09c2540 a2=3 a3=0 items=0 ppid=1 pid=4897 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:38.087000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:29:38.089341 sshd[4897]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:29:38.094606 systemd-logind[1219]: New session 22 of user core. Dec 13 14:29:38.095291 systemd[1]: Started session-22.scope. Dec 13 14:29:38.100000 audit[4897]: USER_START pid=4897 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:38.101000 audit[4899]: CRED_ACQ pid=4899 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:38.329973 sshd[4897]: pam_unix(sshd:session): session closed for user core Dec 13 14:29:38.329000 audit[4897]: USER_END pid=4897 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:38.330000 audit[4897]: CRED_DISP pid=4897 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:38.334029 systemd[1]: sshd@21-10.0.0.112:22-10.0.0.1:46914.service: Deactivated successfully. Dec 13 14:29:38.334818 systemd[1]: session-22.scope: Deactivated successfully. Dec 13 14:29:38.333000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.112:22-10.0.0.1:46914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:38.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.112:22-10.0.0.1:46922 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:38.336780 systemd[1]: Started sshd@22-10.0.0.112:22-10.0.0.1:46922.service. Dec 13 14:29:38.337154 systemd-logind[1219]: Session 22 logged out. Waiting for processes to exit. Dec 13 14:29:38.338423 systemd-logind[1219]: Removed session 22. Dec 13 14:29:38.367000 audit[4910]: USER_ACCT pid=4910 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:38.369027 sshd[4910]: Accepted publickey for core from 10.0.0.1 port 46922 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:29:38.368000 audit[4910]: CRED_ACQ pid=4910 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:38.368000 audit[4910]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9aba9220 a2=3 a3=0 items=0 ppid=1 pid=4910 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:38.368000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:29:38.370272 sshd[4910]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:29:38.375751 systemd[1]: Started session-23.scope. Dec 13 14:29:38.376112 systemd-logind[1219]: New session 23 of user core. Dec 13 14:29:38.380000 audit[4910]: USER_START pid=4910 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:38.382000 audit[4912]: CRED_ACQ pid=4912 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:38.487770 sshd[4910]: pam_unix(sshd:session): session closed for user core Dec 13 14:29:38.487000 audit[4910]: USER_END pid=4910 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:38.488000 audit[4910]: CRED_DISP pid=4910 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:38.489000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.112:22-10.0.0.1:46922 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:38.490480 systemd[1]: sshd@22-10.0.0.112:22-10.0.0.1:46922.service: Deactivated successfully. Dec 13 14:29:38.491498 systemd[1]: session-23.scope: Deactivated successfully. Dec 13 14:29:38.492291 systemd-logind[1219]: Session 23 logged out. Waiting for processes to exit. Dec 13 14:29:38.493205 systemd-logind[1219]: Removed session 23. Dec 13 14:29:43.494014 systemd[1]: Started sshd@23-10.0.0.112:22-10.0.0.1:46934.service. Dec 13 14:29:43.493000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.112:22-10.0.0.1:46934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:43.495376 kernel: kauditd_printk_skb: 57 callbacks suppressed Dec 13 14:29:43.495458 kernel: audit: type=1130 audit(1734100183.493:1495): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.112:22-10.0.0.1:46934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:43.526000 audit[4923]: USER_ACCT pid=4923 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:43.528998 sshd[4923]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:29:43.530382 sshd[4923]: Accepted publickey for core from 10.0.0.1 port 46934 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:29:43.527000 audit[4923]: CRED_ACQ pid=4923 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:43.533892 systemd-logind[1219]: New session 24 of user core. Dec 13 14:29:43.534586 systemd[1]: Started session-24.scope. Dec 13 14:29:43.536535 kernel: audit: type=1101 audit(1734100183.526:1496): pid=4923 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:43.536580 kernel: audit: type=1103 audit(1734100183.527:1497): pid=4923 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:43.536609 kernel: audit: type=1006 audit(1734100183.527:1498): pid=4923 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Dec 13 14:29:43.527000 audit[4923]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff01de9bd0 a2=3 a3=0 items=0 ppid=1 pid=4923 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:43.544278 kernel: audit: type=1300 audit(1734100183.527:1498): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff01de9bd0 a2=3 a3=0 items=0 ppid=1 pid=4923 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:43.544337 kernel: audit: type=1327 audit(1734100183.527:1498): proctitle=737368643A20636F7265205B707269765D Dec 13 14:29:43.527000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:29:43.538000 audit[4923]: USER_START pid=4923 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:43.551521 kernel: audit: type=1105 audit(1734100183.538:1499): pid=4923 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:43.551589 kernel: audit: type=1103 audit(1734100183.539:1500): pid=4925 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:43.539000 audit[4925]: CRED_ACQ pid=4925 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:43.677017 sshd[4923]: pam_unix(sshd:session): session closed for user core Dec 13 14:29:43.677000 audit[4923]: USER_END pid=4923 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:43.680109 systemd[1]: sshd@23-10.0.0.112:22-10.0.0.1:46934.service: Deactivated successfully. Dec 13 14:29:43.681085 systemd[1]: session-24.scope: Deactivated successfully. Dec 13 14:29:43.681675 systemd-logind[1219]: Session 24 logged out. Waiting for processes to exit. Dec 13 14:29:43.682555 systemd-logind[1219]: Removed session 24. Dec 13 14:29:43.677000 audit[4923]: CRED_DISP pid=4923 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:43.687005 kernel: audit: type=1106 audit(1734100183.677:1501): pid=4923 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:43.687090 kernel: audit: type=1104 audit(1734100183.677:1502): pid=4923 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:43.679000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.112:22-10.0.0.1:46934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:44.932000 audit[4936]: NETFILTER_CFG table=filter:127 family=2 entries=20 op=nft_register_rule pid=4936 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:44.932000 audit[4936]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff75e36ee0 a2=0 a3=7fff75e36ecc items=0 ppid=2274 pid=4936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:44.932000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:29:44.941000 audit[4936]: NETFILTER_CFG table=nat:128 family=2 entries=106 op=nft_register_chain pid=4936 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:29:44.941000 audit[4936]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fff75e36ee0 a2=0 a3=7fff75e36ecc items=0 ppid=2274 pid=4936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:44.941000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:29:48.682393 systemd[1]: Started sshd@24-10.0.0.112:22-10.0.0.1:54746.service. Dec 13 14:29:48.681000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.112:22-10.0.0.1:54746 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:48.688613 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 14:29:48.688731 kernel: audit: type=1130 audit(1734100188.681:1506): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.112:22-10.0.0.1:54746 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:48.717000 audit[4941]: USER_ACCT pid=4941 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:48.719322 sshd[4941]: Accepted publickey for core from 10.0.0.1 port 54746 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:29:48.723000 audit[4941]: CRED_ACQ pid=4941 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:48.724766 sshd[4941]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:29:48.728702 kernel: audit: type=1101 audit(1734100188.717:1507): pid=4941 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:48.728765 kernel: audit: type=1103 audit(1734100188.723:1508): pid=4941 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:48.728826 kernel: audit: type=1006 audit(1734100188.723:1509): pid=4941 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Dec 13 14:29:48.729064 systemd-logind[1219]: New session 25 of user core. Dec 13 14:29:48.730119 systemd[1]: Started session-25.scope. Dec 13 14:29:48.723000 audit[4941]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffedbdc5d80 a2=3 a3=0 items=0 ppid=1 pid=4941 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:48.734984 kernel: audit: type=1300 audit(1734100188.723:1509): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffedbdc5d80 a2=3 a3=0 items=0 ppid=1 pid=4941 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:48.735025 kernel: audit: type=1327 audit(1734100188.723:1509): proctitle=737368643A20636F7265205B707269765D Dec 13 14:29:48.723000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:29:48.733000 audit[4941]: USER_START pid=4941 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:48.740639 kernel: audit: type=1105 audit(1734100188.733:1510): pid=4941 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:48.740686 kernel: audit: type=1103 audit(1734100188.734:1511): pid=4943 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:48.734000 audit[4943]: CRED_ACQ pid=4943 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:48.847450 sshd[4941]: pam_unix(sshd:session): session closed for user core Dec 13 14:29:48.847000 audit[4941]: USER_END pid=4941 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:48.850459 systemd[1]: sshd@24-10.0.0.112:22-10.0.0.1:54746.service: Deactivated successfully. Dec 13 14:29:48.851287 systemd[1]: session-25.scope: Deactivated successfully. Dec 13 14:29:48.847000 audit[4941]: CRED_DISP pid=4941 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:48.854713 systemd-logind[1219]: Session 25 logged out. Waiting for processes to exit. Dec 13 14:29:48.855628 systemd-logind[1219]: Removed session 25. Dec 13 14:29:48.858030 kernel: audit: type=1106 audit(1734100188.847:1512): pid=4941 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:48.858116 kernel: audit: type=1104 audit(1734100188.847:1513): pid=4941 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:48.847000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.112:22-10.0.0.1:54746 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:52.902585 kubelet[2075]: E1213 14:29:52.902543 2075 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:29:53.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.112:22-10.0.0.1:54758 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:53.853724 systemd[1]: Started sshd@25-10.0.0.112:22-10.0.0.1:54758.service. Dec 13 14:29:53.854900 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:29:53.854957 kernel: audit: type=1130 audit(1734100193.852:1515): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.112:22-10.0.0.1:54758 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:53.889000 audit[4970]: USER_ACCT pid=4970 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:53.892292 sshd[4970]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:29:53.894635 sshd[4970]: Accepted publickey for core from 10.0.0.1 port 54758 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:29:53.890000 audit[4970]: CRED_ACQ pid=4970 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:53.898055 systemd-logind[1219]: New session 26 of user core. Dec 13 14:29:53.899115 systemd[1]: Started session-26.scope. Dec 13 14:29:53.899649 kernel: audit: type=1101 audit(1734100193.889:1516): pid=4970 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:53.899720 kernel: audit: type=1103 audit(1734100193.890:1517): pid=4970 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:53.903163 kernel: audit: type=1006 audit(1734100193.890:1518): pid=4970 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Dec 13 14:29:53.903239 kernel: audit: type=1300 audit(1734100193.890:1518): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdcda66d60 a2=3 a3=0 items=0 ppid=1 pid=4970 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:53.890000 audit[4970]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdcda66d60 a2=3 a3=0 items=0 ppid=1 pid=4970 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:53.890000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:29:53.909535 kernel: audit: type=1327 audit(1734100193.890:1518): proctitle=737368643A20636F7265205B707269765D Dec 13 14:29:53.909588 kernel: audit: type=1105 audit(1734100193.904:1519): pid=4970 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:53.904000 audit[4970]: USER_START pid=4970 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:53.914586 kernel: audit: type=1103 audit(1734100193.906:1520): pid=4978 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:53.906000 audit[4978]: CRED_ACQ pid=4978 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:54.026220 sshd[4970]: pam_unix(sshd:session): session closed for user core Dec 13 14:29:54.026000 audit[4970]: USER_END pid=4970 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:54.028597 systemd[1]: sshd@25-10.0.0.112:22-10.0.0.1:54758.service: Deactivated successfully. Dec 13 14:29:54.029509 systemd[1]: session-26.scope: Deactivated successfully. Dec 13 14:29:54.030557 systemd-logind[1219]: Session 26 logged out. Waiting for processes to exit. Dec 13 14:29:54.031312 systemd-logind[1219]: Removed session 26. Dec 13 14:29:54.026000 audit[4970]: CRED_DISP pid=4970 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:54.035001 kernel: audit: type=1106 audit(1734100194.026:1521): pid=4970 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:54.035063 kernel: audit: type=1104 audit(1734100194.026:1522): pid=4970 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:54.027000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.112:22-10.0.0.1:54758 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:57.902271 kubelet[2075]: E1213 14:29:57.902226 2075 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:29:59.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.112:22-10.0.0.1:50624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:59.031607 systemd[1]: Started sshd@26-10.0.0.112:22-10.0.0.1:50624.service. Dec 13 14:29:59.032693 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:29:59.032745 kernel: audit: type=1130 audit(1734100199.030:1524): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.112:22-10.0.0.1:50624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:59.065000 audit[4999]: USER_ACCT pid=4999 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:59.067211 sshd[4999]: Accepted publickey for core from 10.0.0.1 port 50624 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:29:59.069442 sshd[4999]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:29:59.068000 audit[4999]: CRED_ACQ pid=4999 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:59.072772 systemd-logind[1219]: New session 27 of user core. Dec 13 14:29:59.074240 systemd[1]: Started session-27.scope. Dec 13 14:29:59.077479 kernel: audit: type=1101 audit(1734100199.065:1525): pid=4999 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:59.077537 kernel: audit: type=1103 audit(1734100199.068:1526): pid=4999 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:59.077568 kernel: audit: type=1006 audit(1734100199.068:1527): pid=4999 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Dec 13 14:29:59.068000 audit[4999]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6f81eb70 a2=3 a3=0 items=0 ppid=1 pid=4999 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:59.086021 kernel: audit: type=1300 audit(1734100199.068:1527): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6f81eb70 a2=3 a3=0 items=0 ppid=1 pid=4999 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:59.086087 kernel: audit: type=1327 audit(1734100199.068:1527): proctitle=737368643A20636F7265205B707269765D Dec 13 14:29:59.068000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:29:59.077000 audit[4999]: USER_START pid=4999 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:59.093553 kernel: audit: type=1105 audit(1734100199.077:1528): pid=4999 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:59.093592 kernel: audit: type=1103 audit(1734100199.079:1529): pid=5001 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:59.079000 audit[5001]: CRED_ACQ pid=5001 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:59.182264 sshd[4999]: pam_unix(sshd:session): session closed for user core Dec 13 14:29:59.182000 audit[4999]: USER_END pid=4999 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:59.185232 systemd[1]: sshd@26-10.0.0.112:22-10.0.0.1:50624.service: Deactivated successfully. Dec 13 14:29:59.186317 systemd[1]: session-27.scope: Deactivated successfully. Dec 13 14:29:59.187045 systemd-logind[1219]: Session 27 logged out. Waiting for processes to exit. Dec 13 14:29:59.187891 systemd-logind[1219]: Removed session 27. Dec 13 14:29:59.182000 audit[4999]: CRED_DISP pid=4999 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:59.193993 kernel: audit: type=1106 audit(1734100199.182:1530): pid=4999 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:59.194088 kernel: audit: type=1104 audit(1734100199.182:1531): pid=4999 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:59.182000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.112:22-10.0.0.1:50624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'